Will Donald ‘Trump’ the Cyber Security Industry?By Happy Blob On 13 Mar 2017
Hey guys I am back! Look who I brought with me today: Mr. POTUS himself! President Donald Trump walked into office talking about fighting terrorism and also making America secure and safer for its people. While there are still doubts...
Privileged Identity Management – Why We Need It?By Susmita Sankaran On 25 Nov 2016
In an organization’s IT environment, there are several user accounts. Out of these, the “Super User accounts” are usually among the most important ones as they are used for System administration. These accounts are also called root accounts, administrator, admin...
Security Operations Center – The Heart of Effective DetectionBy Karthik Palanisamy On 15 Sep 2016
Organizations around the world are facing cyber-attacks at regular frequency. Technology is evolving and so are safe guards, however, the threat perception is changing only for the worse. Even the latest security software and solutions have still not been able...
Creating and Maintaining a Security Operations Center (SOC)By Karthik Palanisamy On 15 Sep 2016
In recent times organizations have realized that IT security cannot be treated as a surrogate function and it has started to get the respect it deserves. IT security as a whole and IT Security Operation centers, in particular, are getting...
Greatest GRC ChallengesBy Sushilkumar Nahar On 18 Jul 2016
We are in the threshold of interesting times where technology is radically changing the landscape individuals and organizations operate in. We live in times when a simple IoT device like a smartwatch can help gain access to confidential information. There...
These blogs might interest you
by Isaac George on 6 Nov 2020
by Shubhi Rastogi on 16 Oct 2020
by Ajay Agrawal on 29 Sep 2020
by Sowmya MG on 11 Sep 2020
Subscribe for blog updates