Cyber Security
-
Data breach and Cyber attacks
By Mahendra Patukuri On 28 Oct 2016Data breaches and cyber-attacks are two terms that are increasingly making headlines in the world of Cyber security. Cyber-attacks are made to create data breaches and there are very few data breaches without cyber-attacks. The first has a causal relationship...
-
Secure Your Enterprise: Detect, Analyze, and Respond to Threats
By Mahendra Patukuri On 28 Oct 2016The magnitude of cyberattacks and their severity in terms of financial and reputational damage to organizations is increasing every year. A single cyber-security incident, on average, is now estimated to cost large businesses $861,000 and small and medium businesses (SMBs)...
-
What is Happening in the Cyber Threat Landscape?
By Jyothi Babu Thummala On 28 Sep 2016Cyber-crimes are becoming increasingly sophisticated and ambitious in the current age of advanced persistent threats, zero- day attacks and advanced malware. Highly sophisticated threat actors are focused on stealing confidential information including intellectual property, PII, Credit card information, medical records,...
-
Greatest GRC Challenges
By Sushilkumar Nahar On 18 Jul 2016We are in the threshold of interesting times where technology is radically changing the landscape individuals and organizations operate in. We live in times when a simple IoT device like a smartwatch can help gain access to confidential information. There...
Access Governance Cyber Security Governance & Risk Compliance Technology
-
Defending Advanced Persistent Threats – Be Better Prepared to Face the Worst
By Jyothi Babu Thummala On 3 May 2016We often hear news about emerging cyber security threats and attacks impacting every industry. With advanced malwares, zero day exploits and persistent threats, cyber-attacks are now becoming very sophisticated in nature. Targeted attacks are seen from highly motivated attackers, well...
Tag Cloud
Subscribe for blog updates