Big Data, Compliance, Cyber Security, Data Privacy, Differential Privacy

Differential Privacy – My takeaway from Book “Ethical Algorithms” by Michael Kearns and Aaron Roth

Technology controls & drives almost every aspect of the business, data have become the backbone for organizations to get visibility, to be competitive, and to make more agile business decisions. This is why businesses are collecting the maximum possible data from all possible sources. The data does not come free, protecting the data from data breaches and complying with the…

Continue Reading

Automation, Cloud, Compliance, Cyber Resilience, Cyber Security, IoT, Machine Learning

Dangers of Smart Cities – How to Make Them Super Secure?

To serve the need of the ever-increasing population in urban areas is stressing the resources available and the management of these resources. Examples of these resources are water, electricity, west, traffic, transport, parking, health services. The urban planning teams are taking advantage of the technology advancements, availability affordability of high-speed connectivity, the proliferation of IoT devices, and other smart technologies…

Continue Reading

Compliance, Cyber Resilience, Cyber Security, Security Architecture, Security Operation Center

How TOGAF ADM Can Help to Build Security Operation Center

As security architects, we are always challenged with relating business problems, threats, and agile IT to build security without hampering user experience and at the same time secure the crown jewels from lurking cybercriminals. Every CISO might dream of “to have a single screen which tells you how your organization current security posture looks like, which are the risk associated…

Continue Reading

Application Security, Cloud, Compliance, Cyber Resilience, Cyber Security

Cybersecurity – Holistic View

In the past six months, our entire world has changed drastically, the business world is no exception to that, most of the businesses have to fast forward their digitization plans which were originally designed for five years. They have to execute these plans in just a few months, many employees are working from home for the first time and all…

Continue Reading

Artificial Intelligence, Compliance, Cyber Security, Machine Learning

The Rise of Next Generation Security Operation Center (NG-SOC)

The year 2017 has been dominated by the worst cyber-attacks and high profile data breaches. Just to give an example, Consumer credit score company Equifax has revealed that hackers accessed up to 143 million customer account details earlier this year. The data breach happened on July 29 and the details taken include names, social security numbers, drivers’ licenses, and credit…

Continue Reading

Compliance, Cyber Security

Top 10 Skills Every CISO Must Have

Digitization of business, the involvement of disruptive technologies to perform business functions, dissolving the boundaries between usage of personal devices to business work and evolution of technologies like Artificial Intelligence (AI), Machine Learning and Deep Learning are increasing the attack vectors. The targeted attacks using the technological innovation has increased.  The recent ransomware attacks have proven capability to cripple the…

Continue Reading