Breach Response – Lessons learnt in the past one year

The past 12-18 months we have seen a lot of activity in the area of breach response. We not only launched our Big Data Security Analytics platform using ELK, began doing active threat hunting as a service, but we also significantly strengthened our breach response capabilities. I spent most of my consulting hours responding to […]

Why having a bug bounty program makes sense

Introduction Over the past few years, bug bounties have begun to garner mainstream attention. With over 150 companies offering their own bug bounty programs and hundreds of others working with the likes of BugCrowd and HackerOne, it is really no longer a question of whether you should start a bug bounty program or not, but […]

Network Intelligence India – Threat Advisory (8 Feb, 2016)

From Our Blog: Data Privacy – An Introduction by Latha Sunderkrishnan (Senior Consultant) When companies and merchants use data or information that is provided or entrusted to them, this data should be used according to the agreed purposes.  Companies must ensure data privacy because the information is an asset to the company. Privacy concerns exist […]

Updates from Network Intelligence

I am pleased to share the story of our growth so far, specifically the progress made by our Security Solutions Division and the Security Operations Centre (SOC) – now renamed as the Security Services Centre (SSC) But first, some updates … NII posted growth of 80% year-on-year for the financial year 2014-15 We are on […]