Compliance, Cyber Security

7 Books Every CISO Bookshelf Should Have

The role of Chief Information Security Officer (CISO) is a relatively new and started getting organizational level recognition from the CxO community and board of directors.  To establish and prove the importance of this position CISO has to shoulder multiple tasks.

Cyber Security, IoT

Cyber Weapons And Their Dire Consequences

Exponential increase in social media, mobile and IoT devices in our personal and professional life has created tremendous dependency on the internet. Recent spur of cyber-attacks has raised global concerns. News of CIA losing the control of hacking arsenal can create havoc if it falls into wrong hands.

Artificial Intelligence, Cyber Security, Machine Learning

Key Benefits of Cognitive Security

Security threats are growing in volumes and sophistication. Despite the implementation of best of breed detective and preventive controls from edge to endpoints, attackers can get into the organization’s network to steal information or hold organizations data hostage for ransom. Like latest ransomware attack impacted over 200 countries. In this age of IoT, BYOD and social networking – monitoring, analyzing and identifying the…

Continue Reading

Block Chain, Cyber Security

Security Challenges of Blockchain

The cyber attacks on banking and finance industry are increasing. We have witnessed the hacking of   SWIFT network and payment gateways for stealing consumer data. Despite every effort of cyber security defense teams, the hackers can materialize the attacks. Just after two months of the economy crash in 2008, cryptocurrencies like Bitcoin, Ripple, Quark etc. became popular, and the backbone…

Continue Reading

Compliance, Cyber Security

Future of (Cyber) Security Careers

In past two decades, cyber security has evolved at an accelerated rate due to advancements in technology and ever- expanding Internet. Thanks to hackers, without them cybersecurity industry might not have existed. You will wonder before the internet era security was only limited to system administrative passwords. The Antivirus solution was born only after the first Virus attack in 1981 “Elk Virus”, which…

Continue Reading

Artificial Intelligence, Cyber Security, Machine Learning

Artificial Intelligence and Changing Face of Cybersecurity

The cybersecurity attacks are evolved from wild predator-prey chase to well-designed targeted attacks which are creating significant financial and reputational damages to businesses and government. Identification of these attacks is becoming very difficult for the cybersecurity defense teams as the signs of these attacks are very subtle. Hacker are using disruptive technologies like Artificial Intelligence (AI) and machine learning to…

Continue Reading

Cyber Security

Top 5 CISO Challenges

Cyber security attacks have evolved from nerdy kid’s ego satisfaction acts to serious cyber crimes like ransomware. Also, the ever-growing use of mobility and IoT devices to perform business activities is spreading the attack vector drastically.

Cyber Security

Security Threats Definitions – Decoded

There are many words acronyms in our daily vocabulary those we use with ease but to define them we have to scratch our heads. Following are few such words related to cybersecurity.  Advance Persistent Threat (APT)– The sophisticated techniques, methods and attack vectors used by malicious intention hackers to get into the organization’s network and extend the foothold within IT…

Continue Reading