Showing Posts From
Cybersecurity

-
Shankar Jayaraman
- 22 Jul, 2025
Why Your GRC Tool Shouldn't Hold Your Keys? How CISOGenie is changing the game?
When I was a CISO, I found myself in a tough spot. I was really eager to find a GRC tool that could ...

-
Shankar Jayaraman
- 28 Jun, 2025
Indo-Pak & Israel-Iran: Cyber Wars Follow the Same Script?
Cyber attacks on critical infrastructure are no longer secondary acts of disruption, they are now fr ...

-
Balachandra Sivakumar
- 18 Jun, 2025
Massive AT&T Data Breach: Lessons Learned and the Role of Compliance in Prevention
The latest leak of more than 86 million AT&T customer records, which contained sensitive personal in ...

-
Shankar Jayaraman
- 13 Jun, 2025
The 2025 India-Pakistan Cyber Conflict: Key Insights and Takeaways
The India Pakistan cyber war 2025 unleashed an unprecedented cyber onslaught: over 10 crore (100 mil ...

-
Balachandra Sivakumar
- 17 May, 2025
Dissecting a Cyber Attack With a Perspective on Compliance
A website breach We recently came across an interesting case with one of our EAP (Early Access P ...

-
Shankar Jayaraman
- 12 May, 2025
Hidden Cybersecurity Risks in Hospitals from Unpatched Medical Devices
A Silent Threat in the Healing Environment Hospitals, dedicated to healing, face a hidden risk a ...

-
Balachandra Sivakumar
- 26 Apr, 2025
SlopSquatting- A New Dimension to Supply-Chain Attacks
Supply chain has been a prominent threat vector used in cyber-attacks. From the infamous SolarWinds ...

-
Shankar Jayaraman
- 15 Mar, 2025
Cybersecurity
Compliance means following laws and guidelines set by government bodies. For example, in the U.S ...