Over the past few years, spear phishing attacks via highly targeted messages have been the primary vector of successful data breaches. More than 90% of successful attacks on...
more>>
Let me narrate a story of how our life has become nowadays. One fine Monday morning, when the organisation is about to start the day, an alert message on the database from a...
more>>
The heavy reliance on IT has created a need to organize, store and maintain both data and workflows to execute and manage risk and compliance activity across the enterprise. To...
more>>
This new world of smart devices and "Internet of Things" is a far cry from the past where anti-virus applications were the only way to keep hackers out. Now, such software is child's play for those eager to get hold of...
more>>