top of page
Our Recent Posts
Archive
Tags
What is Endpoint Detection & Response (EDR)?
What is Endpoint Protection & Response (EDR)?
How it works and why do companies need EDR?
Continuity of Business during Pandemic
Organisation's BCP plans usually doesn't focus upon pandemic, in such a scenario organisations need to have a people centric approac
IoT Security Risk in Healthcare Industry
IoT security is the new norm for Healthcare industry with vulnerability device scans increasing more than 400%. Healthcare providers need to
What is Credential Stuffing Attack?
Attackers have been using Credential Stuffing Attack technique in the recent months in order to fraudulently gain access to user accounts. H
Evolving Boardrooms strategies in the era of disruptive cyber security risk
Cyber security risk is constantly evolving and now has become a boardroom topic. A quick snap at the 2018 Verizon Data Breach Report which h
Ensuring Efficient & Implementable Business Resilience Plan
How to develop a detailed, efficient and implementable business continuity plan. Importance of sustenance to measure resilience quotient for
How secure is your organization from uncovering the unknown?
Securing your organization from sophisticated unknown attacks by implementing a robust multi tiered cyber security approach to unplug the la
Think ‘Consent’ is the only choice for GDPR compliance?
GDPR was enforced this year to protect all EU citizens data and privacy from breaches.There is a misconception regarding consent as safe or
Blog: Blog
bottom of page