There is old Indian fable about how an elephant looks like to the blind men in the room, the person who touched the trunk of elephant described it as a snake, the person who feels side perceived it as a wall, who touches the ears identified it as fan and story go on … A great many people like blind…
IoT Security Concerns for Consumer Devices & How to Protect It
Smart devices and appliances are part of our daily life, locking our homes, monitoring our fitness, lights, fridge, television sets, web cameras to name the few are connected to the internet and we can access these devices from anywhere. This includes your kid’s smart toys as well. These devices are known as Internet of the Things (IoT). These days you…
Security Features – AWS and Azure
The rapid changes in technology have profoundly changed how we interact, communicate and live our day to day life. This has also drastically changed the way business and governments are providing services to consumers and citizens. Inter connectedness and mobility has significantly changed the consumer expectations, regulators are trying to impose compliance requirements to protect citizen’s data as we well…
How Well Countries Are Prepared To Combat Cyberwar?
Earlier we discussed what is GCI and how it is determined. In this article, we will see how the countries are getting benefitted by the GCI. In today’s interconnected world when attack vector is ever increasing and threats are dynamic the quote of Dolly Parton is very well applicable. We cannot direct the wind, but we can adjust the sails…
What is Global Cyber Security Index (GCI) & How To Use It ?
Sabotaging smart grids, health care, and transport and communication systems sitting at the other end of the globe is an attractive target to get countries to their keens without involving military. We have witnessed the dress reharls of these attacks for some time. Recently we have witnessed massive ransomware attacks like Petya /NotPetya and Wanncry hit more than 300 countries,…
Proven Methods to Secure Your Home Network
The internet has become a basic necessity of our life. Every home is equipped with the wireless router to connect various devices like smartphones, tablets, fitness wear, and home IoTs to the internet This interconnectedness provides the comfort of operating devices from anywhere, anytime this increases the attack vector by providing the breeding ground for cyber crimes. The danger of…
How to Confront Cyberbullying?
Each one of us has been either victim of cyber bullying or bullied somebody or witnessed the bullying. Either as victim or bully, we have gone through the suffering that comes along with it. At the face of it, bullying looks like aggressive behavior but it is not. Aggressive behavior can be provoked or is triggered by the event, it…
Top 10 Blogs Every Security Professional Must Read
Since the stone age, human beings are programmed to keep vigilance of surrounding to protect themselves and community from the prowling predator. They were having systems of signaling each other when one of them spots the danger to make sure that the community is protected. They also learned over a period of time that they can win the battle against…