Research & Technology

post image

Security – Processes built around solutions and products – part 1

Every time  I meet a client to discuss Cyber Security and its importance the replies are mostly like ” I have the best firewall etc. so I am secured. So why do I need to worry about security as ...

+ Read More
post image

Security – Processes built around solutions and products Part 2

The Big Question Asked ” Mohit, a ZERO DAY VULNERABILITY ” how can you discover something which is unknown? You expect us to believe there is a Zero Day and our Perimeter security devices canno...

+ Read More
post image

Using DVWS for API Security – SQL Injection

With advancing web technologies, APIs play a crucial part in application architecture. APIs, if not tested properly, can lead to serious security vulnerabilities. DVWS or Damn Vulnerable Web Servic...

+ Read More
post image

Simplifying Cyber Incident Response: From Challenges to Solutions

Cyberspace, characterized by its borderless nature, has witnessed an alarming surge in cyberattacks. These attacks have evolved to become more precise, intricate, and relentless, posing an ever-inc...

+ Read More
post image

Mastering Cyber Incident Reporting: Simplifying Centralized Incident Management Processes

In today's digital era, cyber incidents pose a significant threat to businesses worldwide. Cyber incident reporting is the systematic process of collecting, documenting, and communicating infor...

+ Read More
post image

From Detection to Resolution: Streamlining Incident Management Processes

In our previous blog post, we explored the intricacies of streamlining incident reporting in cybersecurity management. Building upon that foundation, we now embark on a comprehensive exploration of...

+ Read More
post image

From Simulation to Solution: Insights into Crisis Management

In today's volatile business landscape, the inevitability of crisis looms ever-present. From cybersecurity breaches to market disruptions, organizations face a myriad of potential threats that ...

+ Read More
post image

Strengthening Your Organization's Cyber Resilience: Comprehensive Strategies And Best Practices

In today's digitally interconnected landscape, the importance of cybersecurity resilience cannot be overstated. Cyber threats continue to evolve in sophistication and frequency, posing signific...

+ Read More
post image

Navigating the Cyber Threat Landscape: Why Traditional Crisis Training Falls Short

In an era where cyber threats loom large and evolve rapidly, the ability of organizations to effectively navigate the cyber threat landscape has become a critical determinant of their survival and ...

+ Read More
post image

Building Resilience: Best Practices for Cyber Incident Response

In today's digitally interconnected world, cyber threats are an ever-present reality. No organization, regardless of size or industry, is immune to the risk of cyber incidents. Whether it's...

+ Read More
post image

CSIM Enhancing Cybersecurity Resilience Through Practical Challenges

In today's dynamic threat landscape, cybersecurity resilience is paramount for organizations to withstand and recover from cyber-attacks effectively. However, achieving resilience requires more...

+ Read More
post image

Understanding the Impact of Cyber Attacks on Public Services

According to reports from The Straits Times, Indonesia recently experienced a widespread data breach affecting crucial sectors of public administration and service delivery.
+ Read More

post image

How a Major Cyberattack Disrupted 300 Indian Banks and What It Means for the Future

India was struck by a severe cybersecurity incident that disrupted operations at nearly 300 small banks across the country. The attack, which targeted a crucial technology provider, C-Edge Technolo...

+ Read More
post image

Disney Data Breach: Is Your Entertainment Information Secure?

Can you picture waking up to find that a major data hack has affected one of your favorite entertainment companies? Today, Disney has to deal with this reality. 

After m...

+ Read More
post image

Research Report: Life360 Data Breach Incident

 In March 2024, Life360 experienced a significant data breach that exposed the personal information of + Read More

post image

Preparing for Cybersecurity Incidents: The Value of Tabletop Exercises

The average cost of a Data Breach has increased from $4.45 Million last year to $4.88 Million as of February 2024. This stark increase highlights the importance of preparing your organization for ...

+ Read More