Blogs

November 1, 2019

Halloween – Perfect reminder to dress up your IT security

Halloween is the time when people dress up and revel in the spook, scary way. Halloween is perhaps the one night of the year, when ghosts, ghouls, goblins roam in the streets, Kids enjoy trick or treat going to houses to get candies. In the business world, Halloween is not a single night it is […]

Read More
October 28, 2019

Easy Steps for Amazon Simple Email Service(SES) Configuration

Amazon now has a support for the Setting up Simple Mail Transfer Protocol (SMTP) interface. The Amazon SES SMTP server will support all your existing email sending systems. The SMTP on your site is the best choice for ensuring high email deliverability. In this post, we will share on how the AWS SES can be […]

Read More
October 24, 2019

Understanding Cloud and Security Challenges

Most organizations run on multi cloud environments, given the digital transformation that is taking place.  This broadly means that organizations decision to run enterprise applications in multiple cloud environments like public, private, or hybrid, and the decision to use a mix of cloud service providers, also this can involve multiple infrastructure as a service (IaaS) […]

Read More
October 21, 2019

Another victim falling prey to RANSOMWARE

Pitney Bowes was hit by ransomware on October 14th which made the customers unable to use their services like print labels, mailing, track parcels and manage expenses. This US-based mailing company was infected by the malware called Ransomware which locked the system using encryption and played havoc with the customer services. Currently, Pitney Bowes is working […]

Read More
October 17, 2019

Malicious apps soaring to unsafe heights

With the use of mobile applications thriving high like never before, Hackers seem to love creating a rogue application to steal the data. Threats are surfing at every domain and people tend to download fraudulent apps for their easy use, yet they momentarily forget about the cyberattack it causes. Legitimate apps are created and personal […]

Read More
October 9, 2019

How to reset the Forgotten root password in AWS-EC2 Instance

It is often found challenging or sometimes difficult to reset the forgotten root password in the AWS system. Administrators, and analysts have their task cut out already with deployments or overseeing smooth running of IT systems. The password reset methods in the AWS system is bit difficult and professionals find it time consuming to address […]

Read More
October 1, 2019

Identity and Access Management – Your first choice to Avoid a Data Breach

IAM is the first choice to avoid a data breach.  Many organizations and government agencies seem to ignore this fact completely or simply don’t give importance to it.  IAM is also termed access management or digital identity.  IAM is designed to define security policies and technologies ensuring that the right people in an organization, have […]

Read More
September 25, 2019

How to get API permission for Centrify Multi Factor Authentication (MFA)?

Most clients using Centrify tool find it challenging to get API permission authenticated for MFA. However, after much support from the Centrify teams, Sennovate started to follow the authentication process. The screen shot displayed below will help in starting the authentication process in postman which is the most popular tool used in API testing. 1. […]

Read More
September 21, 2019

Understanding Security Orchestration, Automation and Response (SOAR)

In today’s dynamic IT security landscape, rising security alerts and falling skills shortage is forcing IT decision-makers to look at suitable solutions. Deploying security orchestration, automation and response ( SOAR) is the best answer. The job of the SOAR platform is to identify all threats and automate response for as many of them as possible. […]

Read More
September 16, 2019

Cybersecurity in course curriculum – The Need of the Hour

It’s time we need to look at the cybersecurity to form part of the mainstream course curriculum. Majors like Computer science and allied courses should take this subject very seriously and include it. The need for this push is very much required as there are a huge talent and job gaps. It is roughly estimated […]

Read More
September 10, 2019

California Consumer Privacy Act (CCPA): What you need to know

In a bid to stop data privacy, data breaches and personal information getting compromised, the state of California, has decided to implement the California Consumer Privacy Act (CCPA), starting coming January, 2020.  This move will facilitate consumers at large and getting done away with a free access or unauthorised access of personal information. With a […]

Read More
September 5, 2019

How to Avoid a Data Breach

Government agencies are becoming prime targets for cyber attackers, they hold data for ransom. Whatever the rationale of the cyber attackers, it is imperative that government agencies need to pull up their socks to understand the gravity of the situation, Take the Baltimore data breach which occurred twice in less than a year. Large corporations […]

Read More