Mobile Device Security

Top mobile security threats in 2020

We are moving towards a technology-driven world, all our needs and requirements will be easily fulfilled by our phones and gadgets. But this has also driven a rapid increase in cyber threats. According to a report, there were more than 3.5 million Malwares detected from around 1 million user devices, […]

Read more

Why are cyber vulnerabilities unlikely to go away soon

All the financial firms, government organizations, and other major firms stress over cyber vulnerabilities. The major groups that exploit cyber vulnerabilities are government, ethical hackers and cybercriminals to make discoveries, steal information, protect the information, steal money or expose corruption. Cyber vulnerability is the flaw or weakness that can pose […]

Read more

What does good look like? Part one

Part one Preamble¬† We always hear the words in security “good practice”, “good security” and so on. But what does good mean? From the GDPR it uses the lovely phase of “Taking into account the nature, scope, context and purposes of processing as well as the risks of varying likelihood and […]

Read more
Bring Your Own Device

5 Best Practices for BYOD

The practice of BYOD can be described as the practice in which the organizations allow their employees to utilize smartphones, computers or any other smart device for work purposes. In recent times, there are several organizations that have been implementing the BYOD policies in order to create a successful BYOD […]

Read more

CISO: First 30 days

Intro I have seen quite a few articles on what CISO’s should concentrate on so I am going to give you my opinion. So you have just landed a new role as CISO so after induction (if you don’t have one add it to the list of items to resolve) […]

Read more
Data Breach

Cybersecurity vs. AWS

In this technologically evolving world, Cybersecurity and cloud computing have become extremely essential. In the current business world, every organization is now opting for the AWS services following the requirement of managing the huge amount of the data that is produced every year. In terms of utility, cybersecurity is important […]

Read more