The introduction of cloud, IoT and digital transformation is increasing the attack vector. Security professionals need to expand the security coverage to protect hybrid cloud, SaaS and now Microservices and Function as a Service. The attackers are getting empowered by advancement in technologies like Artificial Intelligence and machine learning to automate the repetitive task like scanning targets and keep them…
Author: Sujata
Five Security Dynamics That Need to be Re-looked
The technology advancements resulted in to interconnectedness, digital transformation is driving enterprises and small business equally, cities and homes are becoming smart, cars are becoming driverless and currency is becoming virtual. Almost everything we need in life is available at the tip of finger. What we used to see in sci-fi films like Matrix in 1990 and 2000 is becoming…
How Big Data is Impacting Cyber Security Operations
Business and organizations are digitally transforming, this spans from automated customer support systems to the intelligent business analytics. The interconnectedness and the use of disruptive technologies like IoT and cloud are enabling the business to grow faster and be competitive. The mammoth of data generated by IT infrastructure, operational technologies, and IoT is utilized for business analytics, improving operational efficiencies.…
Top Five Security Certifications
Today’s cyber-attacks are highly sophisticated and exploit specific vulnerabilities, The regulatory compliance requirements are becoming stringent and there is a shortage of cybersecurity professionals. To grow in this dynamic profession and a wide variety of the tool and technology landscape, it is always confusing what to do next to progress in career and how to take the advantage of this…
Application Security Best Practices Framework
The Year 2017 was the year of globally impacting attacks like WannaCry and Petya and high profile data breaches like Equifax , Uber , Yahoo where millions of user accounts were stolen by the attackers. Equifax, one of the three largest credit agencies in the U.S., suffered a breach that may affect 143 million consumers. Hackers were able to access…
Security Concerns of Internet Of Medical Things (IoMT)
In today’s highly value-focused businesses, treating patients in the closed wall of hospitals is thing of the past; the patients and payers (insurance payers) are expecting high-quality services and low cost. To survive in the highly competitive market, healthcare institutions are riding on the wave of digitization. The industry is evolving new operating models and the new generation of technologies…
How Quantum Computing Will Impact Cyber Security?
Imagine you are in 1980, where the personal computers are only for the academicians and researchers and the only network was ARPA to share the research papers. In those days, it might have been sounded like a scene in Si-Fi movie if somebody says the computer with the huge amount of processing power, memory and storage space can be carried…
The Rise of Next Generation Security Operation Center (NG-SOC)
The year 2017 has been dominated by the worst cyber-attacks and high profile data breaches. Just to give an example, Consumer credit score company Equifax has revealed that hackers accessed up to 143 million customer account details earlier this year. The data breach happened on July 29 and the details taken include names, social security numbers, drivers’ licenses, and credit…