Regular contributors write opinion pieces that reflect their take on topics related to data privacy, security, safety practices, etc.

Featured Article

  • All
  • Opinions

How do modern underground marketplaces operate? What are digital goods and how have they played a major part in the proliferation of dark web marketplaces?

This blog breaks down various search techniques of Intelligent Agents when faced with complex problems in Artificial Intelligence systems, which includes brute force, heuristic, meta-heuristic approaches.

Design Thinking, a human-centered process, solves even the most complex problems for innovative companies like Infosys, PepsiCo, Nike and Starbucks; here’s how.

The deficiency of container security tools is a major concern among developers. Find out how you can run tests on docker containers using CCAT.

The popularity of Active Directory makes it a juicy target for cyber extortion. Here are some quick fixes to address common human errors involving AD.

Page load speed, as a part of website performance, determines the first impression of your online users. Here are different ways by which you can improve it.

Here are some reasons why you should replace your brand monitoring solutions with a digital brand protection system

Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and how to prevent them?

Zero-days are software vulnerabilities that are not known to the developers. Here’s a list of the most popular zero-day attacks.

Defining and explaining the role of a product manager in startups by introducing the 4 Ps of product management.

In the event of full scale cyberattack the pharmaceutical sector could incur huge loss. We review the attacks that hit major pharmaceuticals.

We explain the evolution of the data leak extortion ecosystem through the advancements made by ransomware groups over the last three decades.

What makes digital fingerprints valuable to cybercriminals and what are the preventive measures you can adhere to so as to avoid its theft.

Experienced security professionals say that entry-level positions in security and hacking doesn’t require programming skills. Is this true?

This article explains how effective threat intelligence can assist you in taking proactive measures to counter cyber attacks.

The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly to fend off threats.

More than 1 in 5 organizations have experienced a security incident due to shadow IT. What are the risks associated and how do we avoid them?

It is essential to have quantifiable metrics to gauge the quality of web apps. Here is a list of 6 quality metrics to optimize web apps.

Senior executives are 12 times more likely to be targets of social incidents, and 9 times more likely to be targets of social breaches.

There has been a precipitous rise in the number of COVID-themed data breaches. Here are security practices that can defend your organization.

Here is a consolidated list of popular open source threat intel resources that can help you combat COVID-themed cyber attacks.

Although the security of IoT devices demands immediate attention, the abundance of these devices has resulted in the lack thereof.

Being linked to the services we use every day, makes our phone numbers are attractive targets for hackers, who are increasingly resorting to SIM hijacking.

Scammers have repackaged their scams, that are delivered to us, via other channels. The new schemes are so convincing that we reach out to them.

Investigation of a flaw in the logical design, of a previous version of a popular payment gateway, allowed parallel transactions with the same OTP.

The Reserve Bank of India (RBI) has issued comprehensive guidelines too ensure that Indian banks function in a cyber-resilient environment.

59% of companies have experienced data breach due to third-party vendors. Given the level of access most vendors have to an organization’s network, traditional risk management frameworks fall short.

Executive summary for the Cost of a Data Breach Report 2020, highlighting factors that strengthen an organization’s cyber security posture.