Importance of Identity and Access Management in information security

Identity and Access Management: The Foundation of Security Ever wondered how many of your employees still have access to systems long after they’ve left your company? For most organizations, the shocking answer is “way too many.” This invisible security gap is exactly why Identity and Access Management has become the backbone of modern information security....

The human factor in cybersecurity: Malicious Employees

In the previous post; The human factor in cybersecurity: Employees, we have seen how human factor affects the overall cybersecurity posture of an organization. We classified employees as unwitting and malicious and saw how unwitting employees get duped in compromising the organization’s security policies. We also learned about a methodology to educate the unwitting employees...

Ever growing Social engineering and Phishing attacks

Definition: Social engineering (in the context of information security) is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. The current pandemic (COVID-19) has offered a plethora of opportunities for the bad-actors to put their social engineering skills to wreck mayhem. Sudhakar S Narayan,...

CIO, CISO and COVID-19

The COVID-19 outbreak was declared a Public Health Emergency of International Concern on 30 January 2020 by the WHO. Since then it has now mutated into a PANDEMIC affecting every person and business across the globe. For many, this is the first experience of disruption caused by a pandemic. Businesses that have well-formulated business continuity...

Scroll to top