Does your organization really need a CASB? Here’s a quick guide

Cloud security access broker

Most organizations have CASB, as a consequence of Covid, migrated their entire application base from on-prem to cloud. They are also simultaneously migrating critical internal applications such as their CRM-based or HR modules to the […]

Combating Risks Through Periodic Cybersecurity Audits

periodic cybersecurity audit

Evaluating your cybersecurity audits program on a regular basis is critical in helping to improve awareness of weak spots, vulnerabilities, and potential risks.  Cybersecurity capabilities continue to expand into uncharted waters, and compliance regulations follow […]

An overview of the best cybersecurity certifications and institutes for young graduates and established experts

cybersecurirty career

A shortage of cybersecurity professionals makes now a great time to pursue a career in the space. If you’ve been considering a career in cybersecurity, there’s no time like the present. Whether you’re an acclaimed […]

OWASP Top 10 or OWASP ASVS – Fulfilling the need for robust software security systems

owasp top 10

The OWASP top 10 for 2021 is the most updated and most referred to list by cybersecurity professionals the world over. This data-driven compilation is a well-researched set of common vulnerabilities used by cyber attackers; […]

Challenges in DevSecOps adoption and strategies to address them

devsecops

As cybersecurity and data protection becomes more critical, enterprises and start-ups are moving to DevSecOps to embed security controls end to end in the software development lifecycle (SDLC). Along the journey, there are challenges and […]

Axie Infinity – Ronin Network loses $620m in the largest-ever crypto heist

nomad token b

Axie Infinity is the biggest gaming platform that rewards users for playing games. Ronin Network, which is also owned by Vietnamese parent company Sky Mavis, allows players to exchange the digital coins they earn in […]

Testing cybersecurity resilience with Chaos Engineering

Chaos engineering principles, when applied to cybersecurity, can help build more dynamic, proactive and responsive security controls on-cloud $300,000 an hour. Unfortunately, this isn’t the salary of even the highest paid software engineer in the […]

Application security for a secure enterprise

Remember when you clicked on a legitimate web application but were redirected to an entirely different site with malicious links? Then you have faced a very common web app vulnerability attack vector – a redirect […]

The essential CISO toolkit

chief information security officer

Cybersecurity has become a strategic area for organizations since it has a substantial business impact. The role of Chief Information Security Officers (CISO) has assumed even greater focus. As key business leaders, the onus on […]

Do you have the right IAM policies to secure your public cloud?

IAM policies for security

In a cloud security breach, the problem is misconfigurations in identity and access management (IAM policy). In a tight regulatory environment, a robust IAM policy can secure your cloud environment from inadvertent data leaks. A […]