The Importance of Managing Non-Human Identities in Modern Cybersecurity
Introduction Half a century ago, no one would have imagined how times would change in the world of computers. Once believed that computers were the domain of human beings – their prerogative to access, operate and manage – it is remarkable how today’s scenario is such a far cry from those early days. Take the […]
How Compliance Automation Can Revolutionize Organizational Efficiency
Introduction Amongst the most talked-about requirements of an organization, is the need to be compliant. Every mature industry now calls for organizations within its folds to follow regulations that ensure it is compliant with industry standards, best practices, and certified processes. Compliance teams are akin to watchdogs – constantly on the lookout for grey areas […]
Understanding Chatbots: Opportunities and Challenges
A decade ago, no one would have dreamed that commercial and other organizations would use a virtual assistant to answer queries which until then were the sole responsibility of a salesperson, an office telephone operator, or a receptionist. While organizations still deploy the latter in their front offices, taking cognizance that human interfaces are still […]
Open Source Software in a Cyber-Conscious World
Open Source Software in a Cyber-conscious World The March 2017 breach (1) of credit giant Equifax that resulted in the loss of an estimated 143 million personal records is widely cited in Open Source Software (OSS) circles as one reason for vulnerability vigilance. The breach occurred when attackers used a consumer complaint web portal to […]
Building a Global Cybersecurity Plan – Why Collaboration is Key
Needed : A global plan for cybersecurity The story of notorious French drug dealer Charles Sobhraj will go down as one of the biggest manhunts in the history of modern crime. The ace conman had successfully evaded police across the world, before being apprehended by Indian sleuths first in the beach town of Goa, and […]
A Roadmap for Bridging the Gap Between the Demand and Supply of Cybersecurity Talent
Introduction The relationship between demand and supply and their price sensitivity, made famous by early thinkers and economists like Adam Smith and Alfred Marshall, among others of that era, applies as much to cybersecurity talent as to any other product or service. It is however relevant to start a discussion on the subject by looking […]
Cybersecurity and the C-Suite: A Symbiotic Relationship
The 2019 cyber incident which witnessed Chris Hylen stepping down as CEO of the California-based cybersecurity software services company Imperva, following a massive hack of their customer email, password, and sensitive key data due to a misconfiguration of their cloud service, brought into sharp focus the responsibility of the top brass when it comes to […]
How Red Teaming Can Help Organizations
In the world of professional sports, Opposition Analysis – the scientific study of an opponent’s strengths and weaknesses – is widely followed. Professional coaches and managers routinely deploy analytical approaches to counter opposing team strategies. In-depth analyses of preferred plays, attack patterns, formations, and individual player’s strengths and weaknesses are making play more scientific and […]
How Threat Hunting in the Cloud Can Help Organizations
High up on mountains in four locations – two in Hawaii and one each in Chile and South Africa – the world’s most advanced space telescopes continually scan the night skies to detect threats to the Earth from asteroids and other near-Earth objects hurtling through space. NASA’s Asteroid Terrestrial-impact Last Alert System (or ATLAS for […]
The Convergence of AI and Social Engineering
Introduction Elon Musk’s recently released AI-generated deepfake video (1) on social networking platform X featuring world leaders attired in futuristic outfits has drawn attention in cybersecurity circles to the dangers of Artificial Intelligence (AI). Though Musk’s video is released to poke fun at celebrities, the inherent power of AI to cause immense devastation, to be […]