Cyber security
16 Jun
Zero trust can be trusted
What is Zero Trust? Zero Trust is an information security framework that defines that companies should not trust any entity inside or outside the perimeter at [...]
Read more 09 Jun
Phishing Emails and how to Detect it?
Phishing is not a new phenomenon – it has been the most common attack vector for cyber criminals for a number of years – but knowing how to spot a phishing [...]
Read more 02 Jun
Impacts of AI in Cyber Security
As cyberattacks grow in size and complexity, artificial intelligence (AI) helps the analysts of under-resourced security operations stay ahead of cyber threats. [...]
Read more 28 May
Risk management in futuristic work environment
With work from home becoming the new normal, professionals and students spend more time indoors. They pass time by studying online, working remotely, and [...]
Read more 27 May
Cybersecurity challenges in 2020 and How to tackle them?
Cybersecurity challenges is all about staying ahead by taking preventive action before any threats exploit the system. In this era of digitisation when hackers [...]
Read more 26 May
Is It Time To Outsource Your Data Security?
It is always a good choice for SMBs to employ a managed Security Services provider (MSSP) to handle security. When the Data Security framework becomes more [...]
Read more 20 May
Incident Response Management Process
What is Incident Response Management Incident Response Management is an organised strategy for addressing and managing the aftereffects of a security breach or [...]
Read more 19 May
How does contact tracing work and is my data safe?
Contact Tracing With COVID-19, contact tracing apps have become common. The article here tries to weigh the pros of MIT’s approach to privacy by design. PACT is [...]
Read more 19 May
How to Secure Health Information Systems?
Nowadays, there is a change in the volume of information. Some level of IT maturity is needed in the backdrop of COVID-19 where massive volumes of Health [...]
Read more 18 May
Phishing emails : Every Employee Should Be Aware of!
Phishing emails is a method used to compromise the end users’ computers to gain access into the network or to steal sensitive information. This is done by [...]
Read more