An analysis of India’s Personal Data Protection Bill, benefits and objections of various stakeholders. The government’s decision to withdraw the Personal Data Protection Bill 2019 so close to its implementation, comes as a surprise to […]
The Importance of Log Monitoring in Cybersecurity
Logs can be generated from any software component designed to handle requests and responses. Everything from application and web servers to operating systems, hardware and network devices generate logs of activities and events. Log files […]
Application Security Orchestration and Correlation (ASOC) – The future of AppSec solutions
Managing Application Security (AppSec) usually involves using a wide variety of tools that cater to specific situations. AppSec teams usually use tools like SAST, DAST, and IAST to discover and address vulnerabilities affecting the source […]
Data protection, data security, data privacy: Understanding the difference for better cybersecurity strategy planning
“Data is the new oil”. The phrase was coined in 2006 by Clive Humbly, a British mathematician and data science entrepreneur. Years on, this metaphor only becomes more and more relevant, with data of all […]
Creating secure applications for children
Designing an award-winning applications for children doesn’t just mean engaging graphics and interactive audiovisuals; in-built cyber security controls, and data protection is critical. When the COVID-19 global pandemic broke out, the whole world had to […]
How to ensure data tokenization is truly secure
Data is everywhere. Alongside technology, data tokenization is helping solve the most complex, diverse, and dynamic problems in finance, manufacturing, healthcare, education, climate change, sustainability, economic growth, and business resilience. Nowadays, there is no industry […]
Does your organization really need a CASB? Here’s a quick guide
Most organizations have CASB, as a consequence of Covid, migrated their entire application base from on-prem to cloud. They are also simultaneously migrating critical internal applications such as their CRM-based or HR modules to the […]
Combating Risks Through Periodic Cybersecurity Audits
Evaluating your cybersecurity audits program on a regular basis is critical in helping to improve awareness of weak spots, vulnerabilities, and potential risks. Cybersecurity capabilities continue to expand into uncharted waters, and compliance regulations follow […]
An overview of the best cybersecurity certifications and institutes for young graduates and established experts
A shortage of cybersecurity professionals makes now a great time to pursue a career in the space. If you’ve been considering a career in cybersecurity, there’s no time like the present. Whether you’re an acclaimed […]
OWASP Top 10 or OWASP ASVS – Fulfilling the need for robust software security systems
The OWASP top 10 for 2021 is the most updated and most referred to list by cybersecurity professionals the world over. This data-driven compilation is a well-researched set of common vulnerabilities used by cyber attackers; […]