All Blogs

-
Shankar Jayaraman
- 22 Jul, 2025
Why Your GRC Tool Shouldn't Hold Your Keys? How CISOGenie is changing the game?
When I was a CISO, I found myself in a tough spot. I was really eager to find a GRC tool that could ...

-
Shankar Jayaraman
- 14 Jul, 2025
Demystifying SEBI’s CSCRF
If you’ve ever stared at a SEBI circular wondering whether it’s written for lawyers, CISOs, or sup ...

-
Shankar Jayaraman
- 14 Jul, 2025
16 Billion credentials leaked — Could poor Risk Management strategies be at fault
In mid-June, cybersecurity-focused news outlet Cybernews published a news article[1] that shook the ...

-
Shankar Jayaraman
- 28 Jun, 2025
Indo-Pak & Israel-Iran: Cyber Wars Follow the Same Script?
Cyber attacks on critical infrastructure are no longer secondary acts of disruption, they are now fr ...

-
Balachandra Sivakumar
- 18 Jun, 2025
Massive AT&T Data Breach: Lessons Learned and the Role of Compliance in Prevention
The latest leak of more than 86 million AT&T customer records, which contained sensitive personal in ...

-
Shankar Jayaraman
- 13 Jun, 2025
The 2025 India-Pakistan Cyber Conflict: Key Insights and Takeaways
The India Pakistan cyber war 2025 unleashed an unprecedented cyber onslaught: over 10 crore (100 mil ...