In October 2023, Okta, a leading provider of identity and access management (IAM) solutions, experienced a data breach affecting its customer support system. This incident...
Adopting the 5S strategy in cybersecurity
The 5S strategy has long been considered a reliable approach to workplace organization. Originated and developed as a strategy to facilitate just-in-time manufacturing in post-war...
MOVEit mayhem: Attackers found, patch released, but no end in sight
The entire cybersecurity realmĀ is buzzing over zero-day vulnerabilities and SQL injection attacks owing to the MOVEit Transfer MFT breach. In case you missed it, here’s...
Unravelling the TDIR framework: Conception, evolution, and categorization
Cybersecurity is a mix of both reactive and proactive approaches. In the past, enterprises were often limited to the reactive approach. With compliance and security...
Latitude data breach: How one click could cost you everything
Imagine clicking on a seemingly harmless link and unknowingly giving away your personal and financial information to cybercriminals. Sounds like a nightmare, right? This nightmare...
Will predictive AI revolutionize the SIEM industry?
The cybersecurity industry is extremely dynamic and always finds a way to accommodate the latest and best technologies available into its systems. There are two...
Inside the mind of a hacker: Alternate identities and varied behavioral patterns
The boom of information technology opened an entirely new world of identities and opportunities. Most users’ journies in the cyber world started with the creation...
How low-code platforms can help eliminate shadow IT in your organization
Businesses are constantly trying to up their game in the digital transformation era. Modernizing legacy systems, keeping on top of software updates, and building business...