October 2020 is the 17th year of National Cybersecurity Awareness Month (NCAM). This year has special importance to this month as during the pandemic many aspects of our personal and professional life such as kids’ school, the way we socialize, the way in which we conduct business conferences, and daily activities as a part of the business. Now it is…
Author: Sujata
Next Steps to Cybersecurity – Cyber Resilience
Most of us awestruck by the exponential speed at which the Coronavirus, Covid-19 spread throughout the world. This has affected our personal life as well as the way business work, most of the organization turned to Work From Home (WFH) for their employees. This resulted in migrating business applications or workloads to the cloud and speeding up other digitization projects.…
Are you safe in the Smart home Surrounded by IoT?
Our houses are equipped with many smart devices like Alexa for playing songs we want to listen or order things from amazon, vacuum cleaners like Rumba, smart TVs to record our favorite shows automatically, Nany cams, and security cameras to make sure our kids and our home safe from intruders, Wearables to monitor our health and exercises, etc. In short,…
From Cybersecurity Sisyphus to Cybersecurity Alchemist
Greek civilization was the most influential civilization in the history of the world. Although people of all countries, eras, and stages of civilization have developed myths that explain the existence and workings of natural phenomena, recount the deeds of gods or heroes, or seek to justify social or political institutions, the myths of the Greeks have remained unrivaled in the…
Cyber-security Framework for Multi-Cloud Environment
Most of the conversations with the customers, three subjects are discussed prominently, 1️⃣ Digital transformation, 2️⃣ Vendor agnostic cloud, and 3️⃣ Cyber-security. Part of digital transformation is providing services faster at lower cost and these services can be accessed from any time, anywhere. This is the reason for many organizations “Cloud First” is becoming a new norm. Cloud hosting provides…
CyberSecurity: How to Avoid Being Blinded by Artificial Intelligence
Ever growing cybersecurity threat vector due to digitization and proliferation of IoT devices, the impact, effectiveness of attacks and the shortage of skilled resources to identify, mitigate threats are the main challenges most of the organizations are facing today. This has lead security technology firms to look for options to reduce the efforts of security analyst and improve the effectiveness…
Post Quantum Cryptography (PQC) – Why We Need to be Proactive ?
In recent days we started hearing a lot about Quantum Computing and how it will change the world the way it getting operated now. We also started seeing a discussion about how it will impact cybersecurity from both hacker’s point of view and organizational defence point of view. When we think about security, the first line of defence is cryptography.…
Anatomy of Security Budget From CISO Viewpoint
In the world where security breach is becoming part of headlines, there is a persistent and continuous stream of malware attacks, millions of records are hacked every year which costs the government and commercial businesses billions of dollars. Business partners, customers, and shareholders demand the Cybersecurity assurance that organization cannot provide. Security spend is increasing.