business-impact-analysis-getting-it-right

Business Impact Analysis – Getting it Right

Business Impact Analysis – Getting it Right Introduction It could be the devastating uncontrolled Australian bushfires or the series of floods that affected 13 Indian states, it may be the Fukushima Nuclear Reactor Meltdown in Japan or the most recent n-Coronavirus outbreak. These disasters could cause serious damages to any organisation.  In fact, even a […]

webinar-cybersecurity-for-remote-workforce-by-kk-mookhey

[Webinar] Cybersecurity for Remote Workforce by KK Mookhey

[Webinar] Cybersecurity for Remote Workforce by KK Mookhey With most of the companies enabling Work-From-Home (WFH) for almost all their employees, this brings a wide variety of cybersecurity risks. Recently, major global IT firms were attacked by ransomware. This webinar addressed the risks from the remote working environment and the use of personal devices. The […]

work-from-home cybersecurity

Securing Your Work from Home (WFH) Wireless Network

Due to the current pandemic situation (COVID-19), most organizations have asked employees to start work from home (WFH), wherever possible. When you are working from home, you are dealing with various kind of critical and non-critical information. Security and privacy of this information are the key things which you need to pay attention to. Some […]

PCI-SSC-Remote-Assessments

PCI SSC Update – Remote Assessments

PCI SSC Update – Remote Assessments PCI SSC Update – Remote Assessments We wanted to reach out to you to make you aware of the very important topic of remote assessments during this unusual time of the coronavirus pandemic.  The PCI Council recognizes that this crisis has been very disruptive to the global economy and […]

Cybersecurity in the Cloud – a Shared Responsibility Model

Cybersecurity in the Cloud – a Shared Responsibility Model Cybersecurity in the Cloud – a Shared Responsibility Model As organizations are migrating towards the cloud, the question that needs to be answered is – who is responsible for cloud security? Is that you as a customer or the cloud service provider (CSP)? This article explores […]

Cross-Origin Resource Sharing

Cross-Origin Resource Sharing (CORS)

Cross-Origin Resource Sharing (CORS) What is CORS? CORS stands for Cross-Origin Resource Sharing, which manages cross-origin request. CORS is a mechanism that allows restricted resources (like images, scripts, data) to be requested from another domain. It is a mechanism that uses additional HTTP headers to tell a browser to let a web application running at […]

Cyber-security-of-health-care-devices-India

Security of Health Care Devices

Healthcare Cybersecurity Introduction Did you know? It is established that 1 out of every 4 medical devices is now connected. If we are to go to the hospital today, you would encounter at least 10 medical devices during your visit. Because of this increased connectedness of medical devices, hackers are starting to target medical devices […]

Robotic-Process-Automation-Cybersecurity

RPA (Robotic Process Automation) Use Cases (Part 3)

Robotic Process Automation Cybersecurity Robotic Process Automation Cybersecurity Use cases to apply robotics in cybersecurity There are several opportunities to leverage robotics to enhance your digital strategy, as well as improve security operations. 1.1  Cybersecurity domain Illustrative use case Governance Security program: Robotics can help security reporting quality, timeliness and throughput. For example, automated, periodic […]