Cyber Threat Intelligence
Top Cyber Security influencers you should most definitely followBy Happy Blob On 2 Jun 2017
More than 4,000 ransomware attacks have occurred since the beginning of 2016, according to Computer Crime and Intellectual Property Section. The rise is noticed also in malware, phishing and attacks due to accidental insiders. Security threats are increasing every day...
What is Happening in the Cyber Threat Landscape?By Jyothi Babu Thummala On 28 Sep 2016
Cyber-crimes are becoming increasingly sophisticated and ambitious in the current age of advanced persistent threats, zero- day attacks and advanced malware. Highly sophisticated threat actors are focused on stealing confidential information including intellectual property, PII, Credit card information, medical records,...
Creating and Maintaining a Security Operations Center (SOC)By Karthik Palanisamy On 15 Sep 2016
In recent times organizations have realized that IT security cannot be treated as a surrogate function and it has started to get the respect it deserves. IT security as a whole and IT Security Operation centers, in particular, are getting...
Tips to Choosing The Right Enterprise Security VendorBy Raghuram Gorur On 2 Mar 2016
The stakes are high indeed when it comes to enterprise security. A single breach can have a plethora of effect on a company, resulting in financial and reputational damage. The hard fact is that enterprise security is something we cannot...
Of Honeypots, Decoys and Red HerringsBy Manoj Rai On 9 Feb 2016
A look at cyber- threats The number of apps on your phone is directly proportional to how tech-savvy you can be. Ask any millennial and they will “app” a problem for you. Want to find your lost keys? Want to...
These blogs might interest you
Zero Trust Networks offer protection against many data breaches, but the way to them can be difficult
by Jyoti Bilgoji on 22 May 2019
by Viswanath Subramaniam on 29 Mar 2019
by Yogesh Thippeswamy on 28 Mar 2019
by Arsalaan Kashif on 15 Mar 2019
Subscribe for blog updates