Technology controls & drives almost every aspect of the business, data have become the backbone for organizations to get visibility, to be competitive, and to make more agile business decisions. This is why businesses are collecting the maximum possible data from all possible sources. The data does not come free, protecting the data from data breaches and complying with the…
Category: Compliance
Dangers of Smart Cities – How to Make Them Super Secure?
To serve the need of the ever-increasing population in urban areas is stressing the resources available and the management of these resources. Examples of these resources are water, electricity, west, traffic, transport, parking, health services. The urban planning teams are taking advantage of the technology advancements, availability affordability of high-speed connectivity, the proliferation of IoT devices, and other smart technologies…
How TOGAF ADM Can Help to Build Security Operation Center
As security architects, we are always challenged with relating business problems, threats, and agile IT to build security without hampering user experience and at the same time secure the crown jewels from lurking cybercriminals. Every CISO might dream of “to have a single screen which tells you how your organization current security posture looks like, which are the risk associated…
Cybersecurity – Holistic View
In the past six months, our entire world has changed drastically, the business world is no exception to that, most of the businesses have to fast forward their digitization plans which were originally designed for five years. They have to execute these plans in just a few months, many employees are working from home for the first time and all…
How Quantum Computing Will Impact Cyber Security?
Imagine you are in 1980, where the personal computers are only for the academicians and researchers and the only network was ARPA to share the research papers. In those days, it might have been sounded like a scene in Si-Fi movie if somebody says the computer with the huge amount of processing power, memory and storage space can be carried…
The Rise of Next Generation Security Operation Center (NG-SOC)
The year 2017 has been dominated by the worst cyber-attacks and high profile data breaches. Just to give an example, Consumer credit score company Equifax has revealed that hackers accessed up to 143 million customer account details earlier this year. The data breach happened on July 29 and the details taken include names, social security numbers, drivers’ licenses, and credit…
Top 10 Skills Every CISO Must Have
Digitization of business, the involvement of disruptive technologies to perform business functions, dissolving the boundaries between usage of personal devices to business work and evolution of technologies like Artificial Intelligence (AI), Machine Learning and Deep Learning are increasing the attack vectors. The targeted attacks using the technological innovation has increased. The recent ransomware attacks have proven capability to cripple the…
Top 10 Blogs Every Security Professional Must Read
Since the stone age, human beings are programmed to keep vigilance of surrounding to protect themselves and community from the prowling predator. They were having systems of signaling each other when one of them spots the danger to make sure that the community is protected. They also learned over a period of time that they can win the battle against…