From flying race cars to underwater drug smuggling detection drones, this GITEX showcased some of the best technologies that varied from entertainment to safety and security. The Gulf Information Technology Exhibition (GITEX) Global 2021, which went from October 17th to the 21st, was a must-attend event for anybody interested inRead More…

The psychology of influencing individuals to feel compelled to do specific behaviours- also known as social engineering is one of the most used cyberattack strategies. In the world of cybersecurity, social engineering is nefarious — and the realm of phishing attack perpetrators. Bad actors utilize a variety of psychological tacticsRead More…

Ransomware is one of the most notorious kinds of cyber attack, which unfortunately is increasing day by day since the pandemic. According to Check Point Software Technologies’ study, the weekly average of ransomware assaults climbed to 1115 in May, and it had already surpassed 1210 companies hit by ransomware in the firstRead More…

With the impact of the COVID 19 pandemic, ‘remote working’ has been the “new normal” for all of us. With more people using personal devices for work, companies going through sudden digital transformation and moving data to the cloud, which has led to the increase in number of cyber-attacks sinceRead More…

Over the last year and a half, security professionals have faced a slew of problems that have pushed organizations into unfamiliar territory. Due to the rising adoption of cloud infrastructure, employees using home networks and moving to personal devices, rapid adoption of third-party software applications and risk exposure to anRead More…

In simple words, what is the job of a business leader? It is to be focused and keep the business running successfully. This might have been a much simpler task in the past decade as compared to the present scenario. With the evolving technology landscape and high cybersecurity risk factors,Read More…

“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” This is a wise quote once said by a Global CISO, Stephane Nappo. This couldn’t be more true. On a basic level, brands are built on trust. A brand’s reputation is irreparably tarnished whenRead More…

Phishing is a type of social engineering attack that is often used to steal sensitive information from users. It happens when a hacker poses as a trustworthy person and convinces a victim to open an email, instant message, or text message. Phishing scams are spreading at an alarming pace andRead More…