Cyber Security

What is Global Cyber Security Index (GCI) & How To Use It ?

Sabotaging smart grids, health care, and transport and communication systems sitting at the other end of the globe is an attractive target to get countries to their keens without involving military.  We have witnessed the dress reharls of these attacks for some time. Recently we have witnessed massive ransomware attacks like Petya /NotPetya and Wanncry hit more than 300 countries,…

Continue Reading

Cyber Security

Proven Methods to Secure Your Home Network

The internet has become a basic necessity of our life. Every home is equipped with the wireless router to connect various devices like smartphones, tablets, fitness wear, and home IoTs to the internet  This interconnectedness provides the comfort of operating devices from anywhere, anytime this increases the attack vector by providing the breeding ground for cyber crimes. The danger of…

Continue Reading

Cyber Security

How to Confront Cyberbullying?

Each one of us has been either victim of cyber bullying or bullied somebody or witnessed the bullying. Either as victim or bully, we have gone through the suffering that comes along with it. At the face of it, bullying looks like aggressive behavior but it is not. Aggressive behavior can be provoked or is triggered by the event, it…

Continue Reading

Cyber Security, Deception

Deception As a Strategy for Cyber Security

We have learned deception from nature, we see plants, insects and animals are using deception in two ways. Predators use mimicry and enticement to lure the victims Camouflage as a survival technique Since ancient days human beings are using the deception to win over the opponents. The famous book Art of the War by Sun Tzu provides details of

Compliance, Cyber Security

7 Books Every CISO Bookshelf Should Have

The role of Chief Information Security Officer (CISO) is a relatively new and started getting organizational level recognition from the CxO community and board of directors.  To establish and prove the importance of this position CISO has to shoulder multiple tasks.

Cyber Security, IoT

Cyber Weapons And Their Dire Consequences

Exponential increase in social media, mobile and IoT devices in our personal and professional life has created tremendous dependency on the internet. Recent spur of cyber-attacks has raised global concerns. News of CIA losing the control of hacking arsenal can create havoc if it falls into wrong hands.