The Age of Sharing Cyber Threat Intelligence

We have spent 40 years protecting ourselves as individuals. We tried to trick and outsmart the cybercriminals, but when all our efforts failed, we thought of working with our peers to outnumber them.  Cybercriminals don’t remake themselves every time. They have limited resources and limited budgets. So they use playbooks to attack a lot of […]

What Cybercrime & Security Will Look Like in 2023

Threat actors continue to adapt to the latest technologies, practices, and even privacy laws. It’s up to your organization to stay ahead by implementing strong cybersecurity measures and programs. Here’s how cybercrime will evolve in 2023, and what you can do to keep your business safe and secure in the year ahead. Surge in Attacks […]

Cybersecurity is not a losing game – start now

Reality has a way of asserting itself, no matter what personal or business choices we make, good or bad. For example, very recently, the services of the city of Antwerp in Belgium were the victim of a very disruptive cyber attack. As usual, people cried out ‘bad play’ and suggested that appropriate cybersecurity measures should […]

Tech InDepth: Understanding a future without passkeys and passwords

Tech giants like Apple and Google don’t always have the same mindset when it comes to innovation. For example, take the RCS vs. iMessage debate. But if there’s one thing they’ve agreed on over the years, it’s to do away with passwords and introduce the next step in online security: passkeys. As this report shows, […]

New Digital Personal Data Protection Bill in India ,2022

The new Digital Personal Data Protection Bill, 2022, which was unveiled on 18 November, puts more focus on personal data than previous cumbersome drafts. The revised version of the law provides for high penalties for violations, but these penalties are limited regardless of the turnover of the companies involved. It also eased rules on cross-border […]

Lets talk about Supply Chain Attacks and Cloud Native

The past couple of years have seen an upward push in software supply chain attack, with the maximum salient example being the SolarWinds attack. As production environments have gained a couple of layers of safety, and lots of the attention of safety groups, malicious actors have set their points of interest on “poisoning the properly”, […]