Cloud, Cyber Security

Security Features – AWS and Azure

The rapid changes in technology have profoundly changed how we interact, communicate and live our day to day life. This has also drastically changed the way business and governments are providing services to consumers and citizens. Inter connectedness and mobility has significantly changed the consumer expectations, regulators are trying to impose compliance requirements to protect citizen’s data as we well…

Continue Reading

Cyber Security

How Well Countries Are Prepared To Combat Cyberwar?

Earlier we discussed what is GCI and how it is determined. In this article, we will see how the countries are getting benefitted by the GCI. In today’s interconnected world when attack vector is ever increasing and threats are dynamic the quote of Dolly Parton is very well applicable. We cannot direct the wind, but we can adjust the sails…

Continue Reading

Cyber Security

What is Global Cyber Security Index (GCI) & How To Use It ?

Sabotaging smart grids, health care, and transport and communication systems sitting at the other end of the globe is an attractive target to get countries to their keens without involving military.  We have witnessed the dress reharls of these attacks for some time. Recently we have witnessed massive ransomware attacks like Petya /NotPetya and Wanncry hit more than 300 countries,…

Continue Reading

Cyber Security

Proven Methods to Secure Your Home Network

The internet has become a basic necessity of our life. Every home is equipped with the wireless router to connect various devices like smartphones, tablets, fitness wear, and home IoTs to the internet  This interconnectedness provides the comfort of operating devices from anywhere, anytime this increases the attack vector by providing the breeding ground for cyber crimes. The danger of…

Continue Reading

Cyber Security

How to Confront Cyberbullying?

Each one of us has been either victim of cyber bullying or bullied somebody or witnessed the bullying. Either as victim or bully, we have gone through the suffering that comes along with it. At the face of it, bullying looks like aggressive behavior but it is not. Aggressive behavior can be provoked or is triggered by the event, it…

Continue Reading

Cyber Security, Deception

Deception As a Strategy for Cyber Security

We have learned deception from nature, we see plants, insects and animals are using deception in two ways. Predators use mimicry and enticement to lure the victims Camouflage as a survival technique Since ancient days human beings are using the deception to win over the opponents. The famous book Art of the War by Sun Tzu provides details of