Offense and Defense Two Sides of the Same Coin: Tyler Cohen Wood
If we take a stock of the last couple of years, we’ll find Healthcare as one of the few industries,…
Practical Playbook to Fight Ransomware Attacks
“There will be a ransomware attack every 2 seconds by 2031 on either organizations or individuals up from 11 seconds…
Make Cybersecurity More Immersive; Create Visibility and Observability: Vaidyanathan R Iyer, IBM
Do a general scan of news on cybersecurity, and it appears that hackers and cyber criminals are running a laboratory…
Google Announces to Secure open-source Software (OSS) Supply Chain as Cyber-criminals Look for Vulnerabilities
Google has launched a new initiative to secure open-source software (OSS) supply chain as cyber-criminals look for vulnerabilities like Log4j…
Safeguarding India’s Critical Infrastructures: Connecting the Dots to Improve Security and Resilience
On 28th June 2017, India’s busiest port—Jawaharlal Nehru Port Trust (JNPT) was forced to shut down operations at one of…
Securing Critical Infrastructure is Complex, but Not Impossible: Mathieu Gorge, VigiTrust
Immediately after the conflict between Russia and Ukraine broke out, and subsequently took shape of a full-fledged war, there was…
Shift Focus from Detection to Prevention; SASE is the Tool for the Future: Anurag Kahol, Forcepoint India
When we talk of some of the imminent security threats, among others, ransomware and supply chain attacks emerge as the…
Why India’s New Cybersecurity Directive Raises Many Doubts: A Critical Review
An exponential increase in nearly all types of cybersecurity incidents has seen governments globally becoming active and taking significant steps…
Business Email Compromise: The 43 Billion Dollar Scam & How to Stop it
With over 90 percent of attacks coming via email, phishing remains the most prevalent amongest all cybercrime.