“Data is the new oil”. The phrase was coined in 2006 by Clive Humbly, a British mathematician and data science entrepreneur. Years on, this metaphor only becomes more and more relevant, with data of all […]
Creating secure applications for children
Designing an award-winning applications for children doesn’t just mean engaging graphics and interactive audiovisuals; in-built cyber security controls, and data protection is critical. When the COVID-19 global pandemic broke out, the whole world had to […]
How to ensure data tokenization is truly secure
Data is everywhere. Alongside technology, data tokenization is helping solve the most complex, diverse, and dynamic problems in finance, manufacturing, healthcare, education, climate change, sustainability, economic growth, and business resilience. Nowadays, there is no industry […]
Does your organization really need a CASB? Here’s a quick guide
Most organizations have CASB, as a consequence of Covid, migrated their entire application base from on-prem to cloud. They are also simultaneously migrating critical internal applications such as their CRM-based or HR modules to the […]
Combating Risks Through Periodic Cybersecurity Audits
Evaluating your cybersecurity audits program on a regular basis is critical in helping to improve awareness of weak spots, vulnerabilities, and potential risks. Cybersecurity capabilities continue to expand into uncharted waters, and compliance regulations follow […]
An overview of the best cybersecurity certifications and institutes for young graduates and established experts
A shortage of cybersecurity professionals makes now a great time to pursue a career in the space. If you’ve been considering a career in cybersecurity, there’s no time like the present. Whether you’re an acclaimed […]
OWASP Top 10 or OWASP ASVS – Fulfilling the need for robust software security systems
The OWASP top 10 for 2021 is the most updated and most referred to list by cybersecurity professionals the world over. This data-driven compilation is a well-researched set of common vulnerabilities used by cyber attackers; […]
Challenges in DevSecOps adoption and strategies to address them
As cybersecurity and data protection becomes more critical, enterprises and start-ups are moving to DevSecOps to embed security controls end to end in the software development lifecycle (SDLC). Along the journey, there are challenges and […]
Axie Infinity – Ronin Network loses $620m in the largest-ever crypto heist
Axie Infinity is the biggest gaming platform that rewards users for playing games. Ronin Network, which is also owned by Vietnamese parent company Sky Mavis, allows players to exchange the digital coins they earn in […]
Testing cybersecurity resilience with Chaos Engineering
Chaos engineering principles, when applied to cybersecurity, can help build more dynamic, proactive and responsive security controls on-cloud $300,000 an hour. Unfortunately, this isn’t the salary of even the highest paid software engineer in the […]