In this blog, I envision the information security process and deep dive into the first three steps.
Read moreAt the start of October 2021 there was a disturbance in the Force, as if millions of voices suddenly cried out in terror and were suddenly silenced.
Read moreWhen working with Azure PaaS resources, we typically concentrate more on the code implementation part and external Azure Resources like Azure Application Gateway/Front door or Key vault to support Security of PaaS applications. But there are few basic things which are supported by Azure PaaS Resources to help us to tighten internal security, which we may tend to forget sometimes.
Read moreOnce upon a time, kings and ministers were wealthy based on the kingdom, the size of produce and the taxes they could levy on it.
Read moreOrganizations view cybersecurity as a critical enabler for business growth. Creating a culture of improvement in security strategy is needed.
Read moreSecure code is important. What if a security issue is not found in your code but in one of your dependencies?
Read moreIn this blog, I will address the growing need to embed a culture of taking the crucial steps in the journey of your security maturity improvement without waiting for an overhaul of your security system overnight.
Read moreA robust cybersecurity system is a foundation for a resilient organization.
Read moreSecurity is everyone’s responsibility, and hence, to build awareness, I am sharing a few concepts that will give you a high-level view into the world of security.
Read moreAbstract –As with any other sector, the healthcare industry is also prone to cyber threats. Though the nature of threats…
Read moreThe most vulnerable and least secure point in your network is your device. It is the easiest avenue for cyber…
Read moreIn a recent client meeting when we started discussing 'Security Architecture', I came across interesting views of what Security Architecture…
Read more