Regular contributors write opinion pieces that reflect their take on topics related to data privacy, security, safety practices, etc.
How do modern underground marketplaces operate? What are digital goods and how have they played a major part in the proliferation of dark web marketplaces?
This blog breaks down various search techniques of Intelligent Agents when faced with complex problems in Artificial Intelligence systems, which includes brute force, heuristic, meta-heuristic approaches.
The popularity of Active Directory makes it a juicy target for cyber extortion. Here are some quick fixes to address common human errors involving AD.
Page load speed, as a part of website performance, determines the first impression of your online users. Here are different ways by which you can improve it.
Here are some reasons why you should replace your brand monitoring solutions with a digital brand protection system
We explain the evolution of the data leak extortion ecosystem through the advancements made by ransomware groups over the last three decades.
What makes digital fingerprints valuable to cybercriminals and what are the preventive measures you can adhere to so as to avoid its theft.
Experienced security professionals say that entry-level positions in security and hacking doesn’t require programming skills. Is this true?
This article explains how effective threat intelligence can assist you in taking proactive measures to counter cyber attacks.
The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly to fend off threats.
More than 1 in 5 organizations have experienced a security incident due to shadow IT. What are the risks associated and how do we avoid them?
It is essential to have quantifiable metrics to gauge the quality of web apps. Here is a list of 6 quality metrics to optimize web apps.
Senior executives are 12 times more likely to be targets of social incidents, and 9 times more likely to be targets of social breaches.
There has been a precipitous rise in the number of COVID-themed data breaches. Here are security practices that can defend your organization.
Here is a consolidated list of popular open source threat intel resources that can help you combat COVID-themed cyber attacks.
Being linked to the services we use every day, makes our phone numbers are attractive targets for hackers, who are increasingly resorting to SIM hijacking.
Investigation of a flaw in the logical design, of a previous version of a popular payment gateway, allowed parallel transactions with the same OTP.
The Reserve Bank of India (RBI) has issued comprehensive guidelines too ensure that Indian banks function in a cyber-resilient environment.
59% of companies have experienced data breach due to third-party vendors. Given the level of access most vendors have to an organization’s network, traditional risk management frameworks fall short.