In the dynamic fintech landscape, the shadow of Advanced Persistent Threats (APTs) looms large. APTs, intricate cyberattacks with the goal of establishing a prolonged network presence, have a special affinity for targeting large enterprises. The […]
Tag: cybersecurity
NIST’s Future Foray in Post-Quantum Cryptography
The possibility of quantum computers cracking popular encryption algorithms like RSA and ECC is a growing worry in the field of cryptography as quantum computing advances toward practical utility. A mission to standardize post-quantum cryptography […]
A Comparison of OWASP’s Top 10 API Security Risks for 2019 and 2023 (The Evolution of API Security)
Threats to the digital environment change along with it as it continues to develop. Security for APIs is one area that has undergone tremendous improvement. With the publication of their Top 10 API Security Risks […]
Preparing a Strong Defence against Cyber Warfare amidst Growing Geopolitical Unrest
Everyone from developing nations to world-leading economic powers has either adopted or is in the process of adopting digital forms of operations. But as is the case with any technological advancements, despite making our lives […]
Dealing with the unprecedented rise of data breaches in India
As per the recent study by Netherlands-based Virtual Private Network (VPN) Surfshark, data breaches have globally lowered by 58% in the first quarter of 2022. Although USA, Poland, and Russia are the most breached countries, […]
Australia is under attack!
Australia’s recent run of serious data breaches has left many commentators asking some very pressing questions. It seems as though there’s perhaps a lot more to it than meets the eye. Yes, one could describe […]
Phishing attacks – the biggest security threat to SMEs in the digital era
Phishing has become a common word today, and although many people know what it means, they still fall prey to phishing attacks. Phishing is a type of social engineering, where hackers try to trick you […]
How do you evaluate an external cybersecurity vendor?
With cybercrime on the rise, every organization, whether a large enterprise or a startup, should have expert cybersecurity professionals on the team, or onboard a trusted partners. Even if a company has an internal information […]
A guide to CIS Benchmarks
CIS benchmarks are specifically followed to secure applications at the configuration level. These activities include server hardening, cloud configuration reviews, browser or database hardening, etc. While OWASP provides insight on application security and common vulnerabilities […]
Withdrawing the Personal Data Protection Bill leaves Citizens Vulnerable
An analysis of India’s Personal Data Protection Bill, benefits and objections of various stakeholders. The government’s decision to withdraw the Personal Data Protection Bill 2019 so close to its implementation, comes as a surprise to […]