Bring Your Own Device – BYOD – Security Controls
Bring Your Own Device (BYOD) policies have become increasingly popular among organizations, as they offer employees flexibility and improved productivity...
Bring Your Own Device (BYOD) policies have become increasingly popular among organizations, as they offer employees flexibility and improved productivity...
Futuristic CyberSecurity solutions? Zero Trust Security ArchitectureArtificial Intelligence/Machine Learning-based SecurityQuantum CryptographyHomomorphic EncryptionCyber Deception TechnologyBlockchain-based Security SolutionsAutonomous Security Operations Center (ASOC)Passwordless...
The Cost of Not Securing Your Privileged Users: Lessons Learned from LastPass Breach" LastPass, a password manager with 30 million users,...
Online is a little different for everyone How do you connect online these days? I’ll give you an example from my...
You consider yourself a responsible person when it comes to taking care of your physical possessions. You’ve never left your wallet in...
Your Cybersecurity Comic Relief CVE-2021-20322: Of all the words of mice and men, the saddest are, “it was DNS again.” ...
Relying on the kindness of strangers is not an ideal strategy for CISOs and CIOs. And yet that is the...
Co-authored by: P, Sriram, and Deepak Setty ‘Tis the season for scams. Well, honestly, it’s always scam season somewhere. In...
Threat Summary This month it was disclosed that a Microsoft vulnerability that allows for local privilege elevation, previously patched in...
Threat Summary On November 17, 2021, The US Cybersecurity & Infrastructure Security Agency (CISA) pushed an Alert entitled “Iranian Government-Sponsored...