3 examples of organizations that could have benefited from a CASB

In recent times, the widespread use of cloud services has become common for most organizations. While many organizations now enjoy the savings and convenience afforded by hosting their data and services on cloud platforms, this shift towards the cloud brings …

IT Security 3 min read Read

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount of money invested in IT infrastructure is increasing at an exponential rate. Further, dedicated teams are formed to monitor and optimize the performance of the different solutions that …

General , IT Security 3 min read Read

Cybersecurity compliance: Time to clean up the cobwebs

Cybersecurity compliance became prominent in the last decade. From being a trivial part of an organization’s business strategy in the early years to being a core objective now, cybersecurity compliance has come a long way.

Today, organizations have dedicated teams …

General , IT Security 3 min read Read

Data Privacy Day, Part 2: Overcoming challenges in securing customer information

In part 1 of this series, we discussed data privacy, the related laws, and the data collection practices that help comply with those laws. In this blog, we’ll take a look at the challenges in securing customer data and five …

IT Security 4 min read Read

Clearing the air over the new CERT-In rules

Authorities that lay down compliance regulations often update them in order to keep them relevant. However, for organizations that fall under the purview of these regulations, it can be a challenge to keep up with the updates and ensure that …

IT Security 3 min read Read

Cyber risk score: Learn how to quantify your organization’s cyber resilience

Imagine you’re applying for a loan. One of the important criteria required to obtain approval is the credit score. The higher the credit score, the higher your chances for getting a loan.

Similarly, imagine you’re selling a product on a

General , IT Security 3 min read Read

7 vital security tips for enterprise cloud security administrators

Every organization has tons of sensitive information stored in the cloud. The unanticipated surge in remote work resulted in an increase in the amount of information stored in the cloud. According to TechJury, 67% of enterprise infrastructure is cloud-based.…

IT Security 3 min read Read

Data Privacy Day, Part 1: What you need to know about data privacy

Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed at raising awareness about data privacy and protection practices among businesses as well as internet users. In this blog series, we’ll attempt to do the …

IT Security 4 min read Read

Saudi Aramco data breach: A reminder to start monitoring RPIs

On June 23, 2021, threat actors reported that they had stolen a terabyte of data from Saudi Aramco, a state-owned oil company in Saudi Arabia.

The threat actors released samples of data they had procured after redacting critical information. They …

IT Security 3 min read Read