1. Take all the precaution to keep the Coronavirus away on the
1. Take all the precaution to keep the Coronavirus away on the
[Posted on Behalf of Gary Hayslip, CISO Softbank Investment advisor]
Recently, I have written and spoken on the subject of CISO burnout. I have stated my belief that the job is maturing so fast, it's harming many of the security professionals who se
An Artificial Intelligence (AI) system is only as good as its training. For AI Machine Learning (ML) and Deep Learning (DL) frameworks, the training data sets are a crucial element that defines how the system will operate. Feed it skewed or biased in
Cybersecurity in 2020 will be evolutionary but not revolutionary. Although there is always change and churn, much of the foundational drivers remain relatively stable. Attacks in the next 12 months are likely to persist in ways already known but ta
You've got Mail!
While the world continues to battle with the Corona pandemic, there is another pandemic unfolding in digital space. Businesses and people are seeing an unprecedented onslaught of cyberattacks. As organisations try to maintain the busi
A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position to understand how vulnerable major companies a
As the CEO of Zoom, Eric Yuan is certainly one of the beneficiaries of the dramatic shift to remote work that’s occurred in light of the COVID-19 pandemic. His video conferencing platform has become somewhat of a phenomenon virtually overnight, and Y
Novel CoronaVirus is not only posing a grave danger in the real world, but it is also posing a threat to the cyberworld. Cybercriminals are exploiting the public fears about this deadly virus using phishing attacks.
Phishing is a technique used by cyb
Trying times like these requires organization to put their best foot forward for the safety of their employees and to enable business continuity. Work from anywhere in view of lock down and work from home is new normal. While some organizations had r
The video conference company Zoom has skyrocketed to new heights and plummeted to new lows in the past few weeks. It is one of the handful of communications applications that is perfectly suited to a world beset by quarantine actions, yet has fallen
Always thought of writing this blog, since the COVID-19 menace started literally scaring all of us. For me today is the 10th day of following social distancing, the need of the hour. The 1st week itself was very hectic from work perspective. Enabling
This blog is posted on behalf of Nilesh Gavali. As organizations prepare for possible impacts of Coronavirus Disease 2019 (COVID-19), many may consider alternate workplace options for their employees. Remote work options—or telework—require an enterp
This is posted on behalf of Ashish Khanna, Assistant Vice President - Corporate IT for EIH Limited (Oberoi Group).
Due to CORONA virus most of the organizations are allowing their employees to work form home.Here is a checklist for work from home ami
These Information Security Tips when Working from Home are posted on behalf of Bhushan Deo, CISO for Thermax Limited.
Connection & Access
By @NileshGavali, CISSP, Security+
Covid-19 – Teleworking Guideline
As You all are aware that not only, we should fear Corona Virus but also Security Viruses (Malware, Ransomware, Worms, etc.) so hygiene is most important part of IT team. Encouraging o
I have been involved in response to COVID19 which took the world by surprise & during last 2 months, I did several things at unprecedented speed.
I am putting together this article summarizing my lessons learnt & hope these will be useful for others
We wanted to share with you some of the amazing moments from “Annual Summit, India 2020” @ Bangalore on 21 & 22 Feb. We had over 700+ attendees including CISO and SACON attendees sharing knowledge through Taskforce Presentations, Panel Discussions Ro
By @NileshGavali, CISSP,SecurityPlus
Today’s organizations face huge challenges securing and protecting servers, networks, and digital assets. This goes double for mobile users, as they — and their laptops, tablets, and other devices. Also
Hey, guys i just decided to solve the Nebula machine from exploit education.
I’ve also made a youtube video about it which you can refer to.
Youtube link : https://youtu.be/9Xd28FjugM8