In today’s dynamic IT security landscape, rising security alerts and falling skills shortage is forcing IT decision-makers to look at suitable solutions. Deploying security orchestration, automation and response ( SOAR) is the best answer. The job of the SOAR platform is to identify all threats and automate response for as many of them as possible. […]
It’s time we need to look at the cybersecurity to form part of the mainstream course curriculum. Majors like Computer science and allied courses should take this subject very seriously and include it. The need for this push is very much required as there are a huge talent and job gaps. It is roughly estimated […]
In a bid to stop data privacy, data breaches and personal information getting compromised, the state of California, has decided to implement the California Consumer Privacy Act (CCPA), starting coming January, 2020. This move will facilitate consumers at large and getting done away with a free access or unauthorised access of personal information. With a […]
Government agencies are becoming prime targets for cyber attackers, they hold data for ransom. Whatever the rationale of the cyber attackers, it is imperative that government agencies need to pull up their socks to understand the gravity of the situation, Take the Baltimore data breach which occurred twice in less than a year. Large corporations […]
Technology providers are present worldwide, but to know who is the best among the vendors is a challenging task for analysts, and for organizations to choose, as each vendor offering will have some features same, some missing and some features added to their product offerings. So how do we figure out who are the leaders […]
Starting October 1, 2020, every State and Territory Resident will need to present a REAL ID-compliant license/ID or another acceptable form of identification (like a passport or passport card) for boarding commercial aircraft. This new compliance regulation is based on a law passed after 9/11. A single national standard for all 50 states is being […]
AI systems are on a fast pace, many AI based systems and tools are already emerging or in development stage and soon to hit the market. The business for AI looks exciting, however there is a dark side which is also emerging – the fear of ‘bias‘ that is overlooking these AI based systems. Industry […]
Today with the increasing number of breaches. Security being the check point for production is quite outdated and time consuming. Though having developers fast drive a secure application is a top priority, it causes many internal conflicts and tons of delay for an application to go live. DevSecOps, a complete new shift in the tech […]
Data is everywhere and so are the data breaches. With increasing number data breaches every day. The organization takes lots of measures to secure their data and network. Still data breach is increasing day by day. Recently in the last week of July, Los Angeles (LA) police department informed its officers, and applicants who wanted to […]
Centrify, a leading cloud provider of Zero Trust Privilege joined several working groups in the Identity Defined Security Alliance (IDSA). The IDSA is an independent industry alliance comprising of leading identity and security vendors, solution providers, and practitioners. The aim of IDSA is to leverage existing cyber security investments to establish a stronger security posture […]
This checklist is designed to offer guidance to decision makers in enterprises, small and mid-tier organizations, government agencies or other organizations to assess single sign-on (SSO) systems, as well for SSO developers to ensure that they have provided is equipped to detect the possibilities of exchanging identification and authentication credentials. This checklist will provide you with: […]
As the country is bracing itself for the 2020 census, the census bureau is deploying security measures of two-factor authentication, and encryption to protect potential leaks in data. However, a few govt agencies opine that the census 2020 will employ new digital technologies like cloud, mobile computing, which might face cybersecurity risks – an attractive […]