Blog

Unleash more of your potential with weekly updates, tailored for your team.

California Consumer Privacy Act (CCPA): What you need to know

California Consumer Privacy Act (CCPA): What you need to knowIn a bid to stop data privacy, data breaches and personal information getting compromised, the state of California, has decided to implement the California Consumer Privacy Act (CCPA), starting coming...

How to Avoid a Data Breach

How to Avoid a Data Breach Government agencies are becoming prime targets for cyber attackers, they hold data for ransom. Whatever the rationale of the cyber attackers, it is imperative that government agencies need to pull up their socks to understand the gravity of...

Real ID-Compliant – A Must for all Residents

Real ID-Compliant – A Must for all ResidentsStarting October 1, 2020, every State and Territory Resident will need to present a REAL ID-compliant license/ID or another acceptable form of identification (like a passport or passport card) for boarding commercial...

AI Bias And Related Cyber Security Issues

AI Bias And Related Cyber Security IssuesAI systems is on a fast pace, many AI based systems and tools are already emerging or in development stage and soon to hit the market.  The business for AI looks exciting, however there is a dark side which is also emerging  -...

Giving more power to development teams

Giving more power to development teams Today with the increasing number of breaches. Security being the check point for production is quite outdated and time consuming. Though having developers fast drive a secure application is a top priority, it causes many internal...

Los Angeles Police Department Faces Data Breach

Los Angeles Police Department Faces Data BreachData is everywhere and so are the data beaches. With increasing number data breaches every day. The organization takes lots of measures to secure their data and network. Still data breach is increasing day by day....

Centrify Joins Identity Defined Security Alliance (IDSA)

Centrify Joins Identity Defined Security Alliance (IDSA)Centrify, a leading cloud provider of Zero Trust Privilege joined several working groups in the Identity Defined Security Alliance (IDSA). The IDSA is an independent industry alliance comprising of leading...

2020 US census – data breaches looms large

2020 US census – data breaches looms largeAs the country is bracing itself for the 2020 census, the census bureau is deploying security measures of two-factor authentication, and encryption to protect potential leaks in data.  However, a few govt agencies opine...

Idaptive’s Next-Gen Access Cloud – Based on Zero Trust Model

Idaptive’s Next-Gen Access Cloud – Based on Zero Trust Model As technology landscape is changing fast, Artificial intelligence (AI) and machine language (ML), is gaining momentum. IT security vendors are keeping in pace with these trends. A key IT security...

Role of Security assessment in Mergers and acquisitions (M&A)

Role of Security assessment in Mergers and acquisitions (M&A) Due diligence Review (DDR) is critically important component in the M&A process, be it financial numbers or legal/ regulatory obligations with big monetary stakes.  Amidst all these, cyber security...

Fintech Security warnings – being well prepared

Fintech Security warnings – being well prepared With rapid increase in adoption of Fintech, come increased security threats. Newer technologies like Block chain, Artificial Intelligence (AI) in the Financial services industry is not only reducing the manual work...

Stay Up to Date With The Latest News & Updates

Join Our Newsletter

Unleash more of your potential with weekly updates, tailored for your team.