Axie Infinity is the biggest gaming platform that rewards users for playing games. Ronin Network, which is also owned by Vietnamese parent company Sky Mavis, allows players to exchange the digital coins they earn in […]
Testing cybersecurity resilience with Chaos Engineering
Chaos engineering principles, when applied to cybersecurity, can help build more dynamic, proactive and responsive security controls on-cloud $300,000 an hour. Unfortunately, this isn’t the salary of even the highest paid software engineer in the […]
Application security for a secure enterprise
Remember when you clicked on a legitimate web application but were redirected to an entirely different site with malicious links? Then you have faced a very common web app vulnerability attack vector – a redirect […]
The essential CISO toolkit
Cybersecurity has become a strategic area for organizations since it has a substantial business impact. The role of Chief Information Security Officers (CISO) has assumed even greater focus. As key business leaders, the onus on […]
Do you have the right IAM policies to secure your public cloud?
In a cloud security breach, the problem is misconfigurations in identity and access management (IAM policy). In a tight regulatory environment, a robust IAM policy can secure your cloud environment from inadvertent data leaks. A […]
Cybersecurity trends in 2021
From data security automation solutions to advanced threat intelligence, zero-trust approach to simulated training campaigns, the landscape is constantly evolving to stay ahead of potential threats. Cybersecurity has emerged as a pivotal arm for organisations […]
Approaching cyber security with a hacker’s mindset
Organisations today need security experts who use the unpredictability of ethical hackers to build constantly evolving, next-generation cyber security programs for greater business resilience. Relentless, highly intelligent, computer whiz, remarkable understanding of human psychology – […]
An SME guidebook to security with Kubernetes
If you are considering a microservices-based architecture to scale up your application or website to the next level, Kubernetes can be a great option to manage it. However, this makes layer-wise security even more important. […]
A strong cybersecurity defense against data breaches is a survival factor
Home delivery, online banking, mobile wallets, e-learning, virtual school, work from home, and even online passport processes or vaccination registrations – the flipside of convenience is data breaches and cybercrime. A study shows that there […]
Do I need to do a source code review?
Writing code is the foundation of building an application. Think Mark Zuckerberg and his army of developers in the movie on Facebook. The smallest missteps could cause glitches at the functional level, and affect the […]