Technological advances and the Internet have profoundly impacted human civilization. Specifically, during the pandemic, it has helped the organization to keep running the business without going to the workplace, during lockdown it helped common people to virtually stay connected to each other from one corner of the world to another. During this time the evil intention people are taking advantage…
Differential Privacy – My takeaway from Book “Ethical Algorithms” by Michael Kearns and Aaron Roth
Technology controls & drives almost every aspect of the business, data have become the backbone for organizations to get visibility, to be competitive, and to make more agile business decisions. This is why businesses are collecting the maximum possible data from all possible sources. The data does not come free, protecting the data from data breaches and complying with the…
Cybersecurity is not A Game for the Gaming Industry
The current pandemic has a profound effect on people. People are taking shelter to social media, streaming video services like Netflix and video gaming, either filling the time or seeking comfort by diverting attention from disturbing news and statics bombarded by various news channels. In recent years the popularity of online video gaming has increased, specifically, Millennials and Gen Z.…
Dangers of Smart Cities – How to Make Them Super Secure?
To serve the need of the ever-increasing population in urban areas is stressing the resources available and the management of these resources. Examples of these resources are water, electricity, west, traffic, transport, parking, health services. The urban planning teams are taking advantage of the technology advancements, availability affordability of high-speed connectivity, the proliferation of IoT devices, and other smart technologies…
How TOGAF ADM Can Help to Build Security Operation Center
As security architects, we are always challenged with relating business problems, threats, and agile IT to build security without hampering user experience and at the same time secure the crown jewels from lurking cybercriminals. Every CISO might dream of “to have a single screen which tells you how your organization current security posture looks like, which are the risk associated…
Cybersecurity – Holistic View
In the past six months, our entire world has changed drastically, the business world is no exception to that, most of the businesses have to fast forward their digitization plans which were originally designed for five years. They have to execute these plans in just a few months, many employees are working from home for the first time and all…
Cybersecurity Automation Best Practices
The very common type of web attack today is credential stuffing. The attackers take stolen passwords from data breaches and use tools to automatically log in to every matching account on other websites to take over those accounts to steal money or the or data. Cybercrime has become a business, and for any growing business, it is all about scale…
How Chaos Engineering can help to achieve Cyber Resilience?
The enterprise infrastructure is becoming more and more distributed and hence complex because of the technological innovations, digitization, proliferation of IoT devices. The current pandemic situation has added to this complexity by accelerating cloud migration projects, cloud-native solutions, and employees Working From Home (WFH). The survey jointly conducted by McAfee and Centre for Long Term Cybersecurity indicates that, across the…