Regular contributors write opinion pieces that reflect their take on topics related to data privacy, security, safety practices, etc.
More than 1 in 5 organizations have experienced a security incident due to shadow IT. What are the risks associated and how do we avoid them?
It is essential to have quantifiable metrics to gauge the quality of web apps. Here is a list of 6 quality metrics to optimize web apps.
Senior executives are 12 times more likely to be targets of social incidents, and 9 times more likely to be targets of social breaches.
There has been a precipitous rise in the number of COVID-themed data breaches. Here are security practices that can defend your organization.
Here is a consolidated list of popular open source threat intel resources that can help you combat COVID-themed cyber attacks.
Being linked to the services we use every day, makes our phone numbers are attractive targets for hackers, who are increasingly resorting to SIM hijacking.
Investigation of a flaw in the logical design, of a previous version of Wibmo payment gateway, allowed parallel transactions with the same OTP.
The Reserve Bank of India (RBI) has issued comprehensive guidelines too ensure that Indian banks function in a cyber-resilient environment.
59% of companies have experienced data breach due to third-party vendors. Given the level of access most vendors have to an organization’s network, traditional risk management frameworks fall short.