Cyber Security, Deception

Deception As a Strategy for Cyber Security

We have learned deception from nature, we see plants, insects and animals are using deception in two ways. Predators use mimicry and enticement to lure the victims Camouflage as a survival technique Since ancient days human beings are using the deception to win over the opponents. The famous book Art of the War by Sun Tzu provides details of

Compliance, Cyber Security

7 Books Every CISO Bookshelf Should Have

The role of Chief Information Security Officer (CISO) is a relatively new and started getting organizational level recognition from the CxO community and board of directors.  To establish and prove the importance of this position CISO has to shoulder multiple tasks.

Cyber Security, IoT

Cyber Weapons And Their Dire Consequences

Exponential increase in social media, mobile and IoT devices in our personal and professional life has created tremendous dependency on the internet. Recent spur of cyber-attacks has raised global concerns. News of CIA losing the control of hacking arsenal can create havoc if it falls into wrong hands.

Artificial Intelligence, Cyber Security, Machine Learning

Key Benefits of Cognitive Security

Security threats are growing in volumes and sophistication. Despite the implementation of best of breed detective and preventive controls from edge to endpoints, attackers can get into the organization’s network to steal information or hold organizations data hostage for ransom. Like latest ransomware attack impacted over 200 countries. In this age of IoT, BYOD and social networking – monitoring, analyzing and identifying the…

Continue Reading