Sign in

Image by Felix Lichtenfeld from Pixabay

The current pandemic has had a profound effect on people. People are taking shelter to social media, streaming video services like Netflix and video gaming, either filling the time or seeking comfort by diverting attention from disturbing news and statics bombarded by various news channels. In recent years the popularity of online video gaming has increased, specifically, Millennials and Gen Z. Video gaming is one of the top three entertainment activities of these players. From simple mobile games to the interactive multiplayer experience, video gaming has been growing in popularity.

Deloitte’s 2020 digital media trends survey found that, during the…


Image credit — Still from Person Of Interest

To serve the need of the ever-increasing population in urban areas is stressing the resources available and the management of these resources. Examples of these resources are water, electricity, west, traffic, transport, parking, health services. The urban planning teams are taking advantage of the technology advancements, availability affordability of high-speed connectivity, the proliferation of IoT devices, and other smart technologies to track and manage resources efficiently. This converts the cities into a digitally connected system, Smart cities.

Smart cities are becoming a reality as part of our everyday lives. We as a society have become dependent on digital technologies and…


As security architects, we are always challenged with relating business problems, threats, and agile IT to build security without hampering user experience and at the same time secure the crown jewels from lurking cybercriminals.

Every CISO might dream of “to have a single screen which tells you how your organization current security posture looks like, which are the risk associated with business-critical assets, which are the security incidents identified, what is the impact of these incidents, what are the priorities for these incidents and what is the current status of these incidents. How the security posture has improved over time…


In the past six months, our entire world has changed drastically, the business world is no exception to that, most of the businesses have to fast forward their digitization plans which were originally designed for five years. They have to execute these plans in just a few months, many employees are working from home for the first time and all this has resulted in increasing cyber-attacks in many folds. Cyber attackers are taking advantage of this rush of digitization escalating cyberattacks and techniques. As cybersecurity professionals, there is learning for us from all this …

The way we used to…


Image credit Pixabay

“In law, a man is guilty when he violets the rights of others. In ethics, he is guilty if he only thinks of doing so.” Immanuel Kant

In the last few years, specifically after the economic crash down, there are plenty of stories that highlight the pitfalls on the road to business success and the people in power abuse power too well. The story can be Wells Fargo (WFC, -0.48%) employees creating fake accounts in the names of real customers, or pharma giant Mylan imposing big price increases on users of its life-saving EpiPen.

The consequences of this not only…


The very common type of web attack today is credential stuffing. The attackers take stolen passwords from data breaches and use tools to automatically log in to every matching account on other websites to take over those accounts to steal money or the or data. Cybercrime has become a business, and for any growing business, it is all about scale and efficiency. Credential stuffing is only a viable attack because of the large-scale automation that technology makes possible.

To counter these kinds of attacks cybersecurity professionals need to get adapted to and focus on the automation and orchestration of security…


October 2020 is the 17th year of National Cybersecurity Awareness Month (NCAM). This year has special importance to this month as during the pandemic many aspects of our personal and professional life such as kids’ school, the way we socialize, the way in which we conduct business conferences, and daily activities as a part of the business. Now it is more important than ever that we protect our digital devices and steer clear of cybercriminals.

Why this awareness of privacy threats and protecting our private, personal data is important to us?

Take an example of how do we use the…


Most of us awestruck by the exponential speed at which the Coronavirus, Covid-19 spread throughout the world. This has affected our personal life as well as the way business work, most of the organization turned to Work From Home (WFH) for their employees. This resulted in migrating business applications or workloads to the cloud and speeding up other digitization projects. These initiatives were expected to happen in the next five years were accelerated to executed in just a few months. This also provided opportunities for malicious intention actors or adversaries to take advantage of the uncertainty. …


The enterprise infrastructure is becoming more and more distributed and hence complex because of the technological innovations, digitization, proliferation of IoT devices. The current pandemic situation has added to this complexity by accelerating cloud migration projects, cloud-native solutions, and employees Working From Home (WFH).

The survey jointly conducted by McAfee and Centre for Long Term Cybersecurity indicates that, across the industry verticals we surveyed, hybrid cloud is the most popular deployment architecture across all major cloud providers, including AWS, Microsoft Azure, GCP, Oracle Cloud, Alibaba Cloud, and IBM cloud. The complexity of the hybrid cloud adds difficulty to the cybersecurity…


Image credit to Pixabay

Our houses are equipped with many smart devices like Alexa for playing songs we want to listen to or order things from amazon, vacuum cleaners like Rumba, smart TVs to record our favorite shows automatically, Nany cams, and security cameras to make sure our kids and our home safe from intruders, Wearables to monitor our health and exercises, etc. In short, our homes have become smart homes.

This sounds wonderful from a convenience point of view; there are many benefits of these smart devices ….

Are we taking a moment and think about the associated risks of these smart connected…

Taslet

Protecting bits to save humanity, Cybersecurity's Changing Gameplan

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store