Cyber Security, Psychology, Social Engineering

Social Engineering Attacks, CyberSecurity & Psychology

Technological advances and the Internet have profoundly impacted human civilization. Specifically, during the pandemic, it has helped the organization to keep running the business without going to the workplace, during lockdown it helped common people to virtually stay connected to each other from one corner of the world to another. During this time the evil intention people are taking advantage…

Continue Reading

Big Data, Compliance, Cyber Security, Data Privacy, Differential Privacy

Differential Privacy – My takeaway from Book “Ethical Algorithms” by Michael Kearns and Aaron Roth

Technology controls & drives almost every aspect of the business, data have become the backbone for organizations to get visibility, to be competitive, and to make more agile business decisions. This is why businesses are collecting the maximum possible data from all possible sources. The data does not come free, protecting the data from data breaches and complying with the…

Continue Reading

Application Security, Automation, Cloud, Cyber Security, Data Privacy, Secure Online

Cybersecurity is not A Game for the Gaming Industry

The current pandemic has a profound effect on people. People are taking shelter to social media, streaming video services like Netflix and video gaming, either filling the time or seeking comfort by diverting attention from disturbing news and statics bombarded by various news channels. In recent years the popularity of online video gaming has increased, specifically, Millennials and Gen Z.…

Continue Reading

Automation, Cloud, Compliance, Cyber Resilience, Cyber Security, IoT, Machine Learning

Dangers of Smart Cities – How to Make Them Super Secure?

To serve the need of the ever-increasing population in urban areas is stressing the resources available and the management of these resources. Examples of these resources are water, electricity, west, traffic, transport, parking, health services. The urban planning teams are taking advantage of the technology advancements, availability affordability of high-speed connectivity, the proliferation of IoT devices, and other smart technologies…

Continue Reading

Compliance, Cyber Resilience, Cyber Security, Security Architecture, Security Operation Center

How TOGAF ADM Can Help to Build Security Operation Center

As security architects, we are always challenged with relating business problems, threats, and agile IT to build security without hampering user experience and at the same time secure the crown jewels from lurking cybercriminals. Every CISO might dream of “to have a single screen which tells you how your organization current security posture looks like, which are the risk associated…

Continue Reading

Application Security, Cloud, Compliance, Cyber Resilience, Cyber Security

Cybersecurity – Holistic View

In the past six months, our entire world has changed drastically, the business world is no exception to that, most of the businesses have to fast forward their digitization plans which were originally designed for five years. They have to execute these plans in just a few months, many employees are working from home for the first time and all…

Continue Reading

Artificial Intelligence, Automation, Cyber Security, Machine Learning

Cybersecurity Automation Best Practices

The very common type of web attack today is credential stuffing. The attackers take stolen passwords from data breaches and use tools to automatically log in to every matching account on other websites to take over those accounts to steal money or the or data. Cybercrime has become a business, and for any growing business, it is all about scale…

Continue Reading

Chaos Engineering, Cyber Resilience, Cyber Security

How Chaos Engineering can help to achieve Cyber Resilience?

The enterprise infrastructure is becoming more and more distributed and hence complex because of the technological innovations, digitization, proliferation of IoT devices. The current pandemic situation has added to this complexity by accelerating cloud migration projects, cloud-native solutions, and employees Working From Home (WFH). The survey jointly conducted by McAfee and Centre for Long Term Cybersecurity indicates that, across the…

Continue Reading