
Kick-start your Cybersecurity career in 2022
The new year is always a great time to set new resolutions. And a great resolution is to do things […]
The new year is always a great time to set new resolutions. And a great resolution is to do things […]
[Webinar] Cybersecurity for Remote Workforce by KK Mookhey With most of the companies enabling Work-From-Home (WFH) for almost all their […]
Healthcare Cybersecurity Introduction Did you know? It is established that 1 out of every 4 medical devices is now connected. […]
The past 12-18 months we have seen a lot of activity in the area of breach response. We not only […]
Introduction Over the past few years, bug bounties have begun to garner mainstream attention. With over 150 companies offering their […]
One of the key security devices in a lot of organizations is an HSM – Hardware Security Module. All banks use […]
If you are looking to navigate your way through the complexities of Big Data and its use in Security, here […]
I am pleased to share the story of our growth so far, specifically the progress made by our Security Solutions […]
This article highlights some of the key risks in executing a successful core banking migration program. Many of these risk elements also relate to any large IT project, but are more aligned towards a core banking migration.
Introduction With the onslaught of SMAC – Social Media, Analytics, Mobility and Cloud Computing – in our personal as well […]