Challenges in DevSecOps adoption and strategies to address them

devsecops

As cybersecurity and data protection becomes more critical, enterprises and start-ups are moving to DevSecOps to embed security controls end to end in the software development lifecycle (SDLC). Along the journey, there are challenges and […]

Axie Infinity – Ronin Network loses $620m in the largest-ever crypto heist

ronin-network-crypto-heist

Axie Infinity is the biggest gaming platform that rewards users for playing games. Ronin Network, which is also owned by Vietnamese parent company Sky Mavis, allows players to exchange the digital coins they earn in […]

Do you have the right IAM policies to secure your public cloud?

IAM policies for security

In a cloud security breach, the problem is misconfigurations in identity and access management (IAM policy). In a tight regulatory environment, a robust IAM policy can secure your cloud environment from inadvertent data leaks. A […]

Approaching cyber security with a hacker’s mindset

cybersecurity hackers

Organisations today need security experts who use the unpredictability of ethical hackers to build constantly evolving, next-generation cyber security programs for greater business resilience. Relentless, highly intelligent, computer whiz, remarkable understanding of human psychology – […]

A strong cybersecurity defense against data breaches is a survival factor

Home delivery, online banking, mobile wallets, e-learning, virtual school, work from home, and even online passport processes or vaccination registrations – the flipside of convenience is data breaches and cybercrime. A study shows that there […]