Compliance, Cyber Security

Top 10 Skills Every CISO Must Have

Digitization of business, the involvement of disruptive technologies to perform business functions, dissolving the boundaries between usage of personal devices to business work and evolution of technologies like Artificial Intelligence (AI), Machine Learning and Deep Learning are increasing the attack vectors. The targeted attacks using the technological innovation has increased.  The recent ransomware attacks have proven capability to cripple the…

Continue Reading

Cyber Security

How Can Small Businesses Protect Themselves From Cyber Attack?

Small businesses are the backbone of any nation’s economy. Historically big enterprises depended on small businesses for producing spare parts, performing jobs to keep the cost low of their products.  In the era of digitization big organizations, except for their core business elements, outsources almost all jobs to Small and Medium-sized Enterprise (SME). This includes accounting, marketing, financial management, credit collection,…

Continue Reading

Cyber Security

A Day in CISO’s Life

My profession gives me the chance of meeting and having deep discussions with CISO. Being in the profession for long enough to have CISO’s in my list of personal friends, I get to know the both sides of the coin, professional and personal. The job of CISO is demanding and challenging. Change is the only constant thing in CISO’s day.…

Continue Reading

Cyber Security

How Vulnerable are Oil and Gas Industries from Cyber Attacks

The word “Digital transformation” has become part of our everyday life, cashless transactions to the touchless automation; industries are transforming rapidly. Oil and gas industry which has played a pivotal role in the economic transformation of the world by providing, fueling the needs of mobility, light, and heat of world’s population is as well going through the digital transformation.  Following…

Continue Reading

Cyber Security

Getting Smart and Safe With Security Awareness

There is hardly a day when we do not read or get to know about cyber-attack, cyber- crime, security breach, zero day attack or identification of a new vulnerability. We have seen every year the security budget and spend on the security is increasing and still, organizations are getting breached.  Most this money goes to implement and manage technologies and…

Continue Reading

Cyber Security

Google Cloud Platform (GCP) Security

Most of the organizations are either started using cloud services or migrating to the cloud. First and the most important decision-making point before migrating the applications to the cloud is, how this transformation will impact the data security and compliance to the applicable regulatory requirements to my business? Most of the prominent cloud service providers like Google (GCP), Amazon (AWS)…

Continue Reading