BlackByte Ransomware - Wilder And Scarier Than Ever
Posted by Dennis, 27-04-2022Researchers from Palo Alto Networks' Unit 42 have published an assessment report regarding BlackByte ransomware. The report includes details regarding the newly discovered samples of the ran...
5 tips to avoid cyberattacks on EdTech platforms
Posted by Samson Santharaj, product consultant, ManageEngine, 07-12-2020As the COVID-19 pandemic rages on, many educational institutions have been forced to shift their on-campus classes to online classes. Various EdTech platforms have also launched free classes that have...
A Chess Game With Cyber Criminals
Posted by Sebastian Toh, 04-12-2020Managing cybersecurity in a business is like a chess game with cyber criminals. There is a lot to think about and one wrong move could result in a checkmate. As the world gets more connected, it also...
Leveraging SOC 2 compliance for Cloud (SAAS) services
Posted by Narendra Sahoo, 03-12-2020In a digital world where we often witness high profile attacks, and incident of a data breach, considering implementation of effective security controls, policies and framework is essential. S...
Data Breach – When Traditional Layers Of Cybersecurity Fail
Posted by Sebastian Toh, 26-11-2020Data Breach – When Traditional Layers Of Cybersecurity Fail “How Prepared Are You?” What happens when your traditional layers of cybersecurity fail? How can you stay ahead of the g...
CyberArk Launches AI-Powered Service to Remove Excessive Cloud Permissions
Posted by admin, 12-11-2020CyberArk the global leader in privileged access management, today announced CyberArk Cloud Entitlements Manager, the industry’s first privilege-based, artificial intelligence...