Tag: Cyber Security

Human Error : A costly affair in cybersecurity

The latest Verizon data breach report suggests that “Human Error” is the primary factor for increasing cyber incidents year-over-year. According to experts, in 2021 and beyond, cybercriminals will unleash the fifth-generation cyber-attacks, while 97% of the world can protect itself only from...

/ March 19, 2021

With frauds on the rise during the pandemic, can AI be your shield?

According to a new study released by the Association of Accredited Fraud Examiners (AAFE) [1], anti-fraud experts are seeing a spike in different forms of fraud due to the COVID-19 pandemic. As of November 2020, the survey reports that 79% of respondents...

/ March 19, 2021

Enterprise Cloud Security to Combat the Digital Threat Landscape

An industry report shares that approximately 80% of companies surveyed had experienced at least one cloud data breach in the last one and a half years. These breaches were the result of misconfiguration of cloud security controls and inadequate visibility into the...

/ February 2, 2021

Ensuring Proactive Cybersecurity Through Threat Hunting

Organizations today need to embrace the new digital world and embrace practices such as remote working, while also being aware that this new way of business expands attack surfaces by opening new doors for hackers to exploit by working opportunistically to take...

/ December 3, 2020

Getting Blockchain Ready on Cloud

There has been a lot of hype around blockchain in the market for few years while it is getting adopted by various organizations, thanks to the cloud. However, blockchain is so much more than just storing data. It can also store program...

/ November 8, 2017
SeCaaS Secure Cloud

SeCaaS – A Step Towards a Secure Cloud

Cloud provides its customers with many characteristics such as on-demand scalability, payment as per usage of the resources, accessibility to the data and application from anywhere in the world. With all these features provided by the cloud, security remains the major issue...

/ October 29, 2017

Blockchain Transaction Authentication and Security

In the blockchain world, data distribution to all trust less entities and immutability are the major advantages in terms of building transparency in transactions. Then what about the transactions happening between entities who want to maintain secrecy or need authentication so that...

/ October 4, 2017

Cyber Security Heads to the Federal Government – Will it Help?

I recently read that the President is expected to announce national cyber security guidelines and rules at the upcoming State of the Union Address. While I am typically not a fan of more government regulations, I do think that the time has...

/ January 14, 2015

Cyber Security Summit Wrap Up and Tips to Detect, Defend, Recover

Have you ever been to an event that left you wanting more when the subject matter just wasn’t up to par or even worse, an event that was almost entirely sales focused and you found yourself spending more time fixing yourself another...

/ September 30, 2013
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...