Blogs

September 21, 2019

Understanding Security Orchestration, Automation and Response (SOAR)

In today’s dynamic IT security landscape, rising security alerts and falling skills shortage is forcing IT decision-makers to look at suitable solutions. Deploying security orchestration, automation and response ( SOAR) is the best answer. The job of the SOAR platform is to identify all threats and automate response for as many of them as possible. […]

Read More
September 16, 2019

Cybersecurity in course curriculum – The Need of the Hour

It’s time we need to look at the cybersecurity to form part of the mainstream course curriculum. Majors like Computer science and allied courses should take this subject very seriously and include it. The need for this push is very much required as there are a huge talent and job gaps. It is roughly estimated […]

Read More
September 10, 2019

California Consumer Privacy Act (CCPA): What you need to know

In a bid to stop data privacy, data breaches and personal information getting compromised, the state of California, has decided to implement the California Consumer Privacy Act (CCPA), starting coming January, 2020.  This move will facilitate consumers at large and getting done away with a free access or unauthorised access of personal information. With a […]

Read More
September 5, 2019

How to Avoid a Data Breach

Government agencies are becoming prime targets for cyber attackers, they hold data for ransom. Whatever the rationale of the cyber attackers, it is imperative that government agencies need to pull up their socks to understand the gravity of the situation, Take the Baltimore data breach which occurred twice in less than a year. Large corporations […]

Read More
August 29, 2019

Sennovate Insights: Gartner Magic Quadrant in Access Management 2019

Technology providers are present worldwide, but to know who is the best among the vendors is a challenging task for analysts, and for organizations to choose, as each vendor offering will have some features same, some missing and some features added to their product offerings. So how do we figure out who are the leaders […]

Read More
August 26, 2019

Real ID-Compliant – A Must for all Residents

Starting October 1, 2020, every State and Territory Resident will need to present a REAL ID-compliant license/ID or another acceptable form of identification (like a passport or passport card) for boarding commercial aircraft.  This new compliance regulation is based on a law passed after 9/11. A single national standard for all 50 states is being […]

Read More
August 16, 2019

AI Bias And Related Cyber Security Issues

AI systems are on a fast pace, many AI based systems and tools are already emerging or in development stage and soon to hit the market.  The business for AI looks exciting, however there is a dark side which is also emerging  – the fear of ‘bias‘ that is overlooking these AI based systems. Industry […]

Read More
August 11, 2019

DevSecOps – Giving more power to development teams

Today with the increasing number of breaches. Security being the check point for production is quite outdated and time consuming. Though having developers fast drive a secure application is a top priority, it causes many internal conflicts and tons of delay for an application to go live. DevSecOps, a complete new shift in the tech […]

Read More
August 7, 2019

Los Angeles Police Department Faces Data Breach

Data is everywhere and so are the data breaches. With increasing number data breaches every day. The organization takes lots of measures to secure their data and network. Still data breach is increasing day by day. Recently in the last week of July, Los Angeles (LA) police department informed its officers, and applicants who wanted to […]

Read More
August 1, 2019

Centrify Joins Identity Defined Security Alliance (IDSA)

Centrify, a leading cloud provider of Zero Trust Privilege joined several working groups in the Identity Defined Security Alliance (IDSA). The IDSA is an independent industry alliance comprising of leading identity and security vendors, solution providers, and practitioners. The aim of IDSA is to leverage existing cyber security investments to establish a stronger security posture […]

Read More
July 30, 2019

Best Practices with Single Sign-On(SSO); Assess You Organization Readiness

This checklist is designed to offer guidance to decision makers in enterprises, small and mid-tier organizations, government agencies or other organizations to assess single sign-on (SSO) systems, as well for SSO developers to ensure that they have provided is equipped to detect the possibilities of exchanging identification and authentication credentials. This checklist will provide you with: […]

Read More
July 24, 2019

2020 US census – data breaches looms large

As the country is bracing itself for the 2020 census, the census bureau is deploying security measures of two-factor authentication, and encryption to protect potential leaks in data.  However, a few govt agencies opine that the census 2020 will employ new digital technologies like cloud, mobile computing, which might face cybersecurity risks – an attractive […]

Read More