Cyberattacks can be detrimental for startups as most startups are deeply rooted in technology & operate on lean infrastructure. It would help the founders and business owners to sleep well at night if they put Security First & avoid simple mistakes which are outlined in this blog.Continue reading
Behind-the-firewall applications are foundational to the work of most organizational teams. And VPN was a solution from yesterday which is under tremendous strain of exponentially increased traffic.
New problems such as the pandemic requires newer solutions such as Zero-Trust to break the monolith infrastructure and move things faster in a secure way.
PricewaterhouseCoopers’ (PwC) 2018 report on the threats that keep chief executive officers (CEOs) up at night shows that there has been no change from 2017 to 2018 in the level of concern executives have about cybersecurity. And it doesn’t look like that it is going to change anytime soon, unless enterprises take a complete view of cybersecurity & address those with rigourContinue reading
We feel it is unfair that Anydesk is singled out & mentioned negatively in this RBI advisory. Instead, there should far more awareness on cybersecurity than going witch-hunt on apps.Continue reading
Learn how to disable the USB port in Windows to prevent loss of data through files copied from company’s devices TO external storage mediaContinue reading
A quick understanding of the “Not-Secure” flag in Chrome browsers and how you can easily avoid that. Also, know more about SSL for websites.Continue reading
With issues related to ‘Data Privacy’ on Facebook popping every now and then, here are 10 must have settings for your Facebook AccountContinue reading
The takedown by law enforcement in April 2018 of the illegal marketplace webstresser.org as part of Operation Power OFF.Continue reading
Protect your online privacy and even prevent yourself from being blackmailed or extorted!Continue reading
Secure Development is a better deal than fixing bugs “later”. Get a quick idea of what SecDLC means and how it can lead to Defense-in-Depth.Continue reading