Business Impact Analysis – Getting it Right Introduction It could be the devastating uncontrolled Australian bushfires or the series of floods that affected 13 Indian states, it may be the Fukushima Nuclear Reactor Meltdown in Japan or the most recent n-Coronavirus outbreak. These disasters could cause serious damages to any organisation. In fact, even a […]
[Webinar] Cybersecurity for Remote Workforce by KK Mookhey With most of the companies enabling Work-From-Home (WFH) for almost all their employees, this brings a wide variety of cybersecurity risks. Recently, major global IT firms were attacked by ransomware. This webinar addressed the risks from the remote working environment and the use of personal devices. The […]
Due to the current pandemic situation (COVID-19), most organizations have asked employees to start work from home (WFH), wherever possible. When you are working from home, you are dealing with various kind of critical and non-critical information. Security and privacy of this information are the key things which you need to pay attention to. Some […]
PCI SSC Update – Remote Assessments PCI SSC Update – Remote Assessments We wanted to reach out to you to make you aware of the very important topic of remote assessments during this unusual time of the coronavirus pandemic. The PCI Council recognizes that this crisis has been very disruptive to the global economy and […]
Cybersecurity in the Cloud – a Shared Responsibility Model Cybersecurity in the Cloud – a Shared Responsibility Model As organizations are migrating towards the cloud, the question that needs to be answered is – who is responsible for cloud security? Is that you as a customer or the cloud service provider (CSP)? This article explores […]
Cross-Origin Resource Sharing (CORS) What is CORS? CORS stands for Cross-Origin Resource Sharing, which manages cross-origin request. CORS is a mechanism that allows restricted resources (like images, scripts, data) to be requested from another domain. It is a mechanism that uses additional HTTP headers to tell a browser to let a web application running at […]
Healthcare Cybersecurity Introduction Did you know? It is established that 1 out of every 4 medical devices is now connected. If we are to go to the hospital today, you would encounter at least 10 medical devices during your visit. Because of this increased connectedness of medical devices, hackers are starting to target medical devices […]
In the previous blog-post, we learned about the Tokens and Privileges which are assigned to the user by the system. In this blog series, we will take a look at the technical aspects of the Token Manipulation Attack. Here, we will be using Microsoft Win API’s in C++ for demonstrating the attack process. TECHNIQUES Technique […]
Token Manipulation Attacks INTRODUCTION In these series of blogpost, we are going to look at the Windows Token-based Attacks along with the full understanding of what are tokens and privileges and how it is implemented in Windows OS Security architecture. Token Manipulation Attack is a common technique used by several APT’s, malware to gain higher […]
Robotic Process Automation Cybersecurity Robotic Process Automation Cybersecurity Use cases to apply robotics in cybersecurity There are several opportunities to leverage robotics to enhance your digital strategy, as well as improve security operations. 1.1 Cybersecurity domain Illustrative use case Governance Security program: Robotics can help security reporting quality, timeliness and throughput. For example, automated, periodic […]