Pitney Bowes was hit by ransomware on October 14th which made the customers unable to use their services like print labels, mailing, track parcels and manage expenses. This US-based mailing company was infected by the malware called Ransomware which locked the system using encryption and played havoc with the customer services. Currently, Pitney Bowes is working […]
With the use of mobile applications thriving high like never before, Hackers seem to love creating a rogue application to steal the data. Threats are surfing at every domain and people tend to download fraudulent apps for their easy use, yet they momentarily forget about the cyberattack it causes. Legitimate apps are created and personal […]
It is often found challenging or sometimes difficult to reset the forgotten root password in the AWS system. Administrators, and analysts have their task cut out already with deployments or overseeing smooth running of IT systems. The password reset methods in the AWS system is bit difficult and professionals find it time consuming to address […]
IAM is the first choice to avoid a data breach. Many organizations and government agencies seem to ignore this fact completely or simply don’t give importance to it. IAM is also termed access management or digital identity. IAM is designed to define security policies and technologies ensuring that the right people in an organization, have […]
Most clients using Centrify tool find it challenging to get API permission authenticated for MFA. However, after much support from the Centrify teams, Sennovate started to follow the authentication process. The screen shot displayed below will help in starting the authentication process in postman which is the most popular tool used in API testing. 1. […]
In today’s dynamic IT security landscape, rising security alerts and falling skills shortage is forcing IT decision-makers to look at suitable solutions. Deploying security orchestration, automation and response ( SOAR) is the best answer. The job of the SOAR platform is to identify all threats and automate response for as many of them as possible. […]
It’s time we need to look at the cybersecurity to form part of the mainstream course curriculum. Majors like Computer science and allied courses should take this subject very seriously and include it. The need for this push is very much required as there are a huge talent and job gaps. It is roughly estimated […]
In a bid to stop data privacy, data breaches and personal information getting compromised, the state of California, has decided to implement the California Consumer Privacy Act (CCPA), starting coming January, 2020. This move will facilitate consumers at large and getting done away with a free access or unauthorised access of personal information. With a […]
Government agencies are becoming prime targets for cyber attackers, they hold data for ransom. Whatever the rationale of the cyber attackers, it is imperative that government agencies need to pull up their socks to understand the gravity of the situation, Take the Baltimore data breach which occurred twice in less than a year. Large corporations […]
Technology providers are present worldwide, but to know who is the best among the vendors is a challenging task for analysts, and for organizations to choose, as each vendor offering will have some features same, some missing and some features added to their product offerings. So how do we figure out who are the leaders […]
Starting October 1, 2020, every State and Territory Resident will need to present a REAL ID-compliant license/ID or another acceptable form of identification (like a passport or passport card) for boarding commercial aircraft. This new compliance regulation is based on a law passed after 9/11. A single national standard for all 50 states is being […]
AI systems are on a fast pace, many AI based systems and tools are already emerging or in development stage and soon to hit the market. The business for AI looks exciting, however there is a dark side which is also emerging – the fear of ‘bias‘ that is overlooking these AI based systems. Industry […]