Business Impact Analysis – Getting it Right
Business Impact Analysis – Getting it Right Introduction It could be the devastating uncontrolled Australian bushfires or the series of floods that affected 13 Indian […]
Business Impact Analysis – Getting it Right Introduction It could be the devastating uncontrolled Australian bushfires or the series of floods that affected 13 Indian […]
[Webinar] Cybersecurity for Remote Workforce by KK Mookhey With most of the companies enabling Work-From-Home (WFH) for almost all their employees, this brings a wide […]
Due to the current pandemic situation (COVID-19), most organizations have asked employees to start work from home (WFH), wherever possible. When you are working from […]
PCI SSC Update – Remote Assessments PCI SSC Update – Remote Assessments We wanted to reach out to you to make you aware of the […]
Cybersecurity in the Cloud – a Shared Responsibility Model Cybersecurity in the Cloud – a Shared Responsibility Model As organizations are migrating towards the cloud, […]
Cross-Origin Resource Sharing (CORS) What is CORS? CORS stands for Cross-Origin Resource Sharing, which manages cross-origin request. CORS is a mechanism that allows restricted resources […]
Healthcare Cybersecurity Introduction Did you know? It is established that 1 out of every 4 medical devices is now connected. If we are to go […]
In the previous blog-post, we learned about the Tokens and Privileges which are assigned to the user by the system. In this blog series, we […]
Token Manipulation Attacks INTRODUCTION In these series of blogpost, we are going to look at the Windows Token-based Attacks along with the full understanding of […]
Robotic Process Automation Cybersecurity Robotic Process Automation Cybersecurity Use cases to apply robotics in cybersecurity There are several opportunities to leverage robotics to enhance your […]