Showing Posts From

Cybersecurity

Why Your GRC Tool Shouldn't Hold Your Keys? How CISOGenie is changing the game?

Why Your GRC Tool Shouldn't Hold Your Keys? How CISOGenie is changing the game?

When I was a CISO, I found myself in a tough spot. I was really eager to find a GRC tool that could ...

Indo-Pak & Israel-Iran: Cyber Wars Follow the Same Script?

Indo-Pak & Israel-Iran: Cyber Wars Follow the Same Script?

Cyber attacks on critical infrastructure are no longer secondary acts of disruption, they are now fr ...

Massive AT&T Data Breach: Lessons Learned and the Role of Compliance in Prevention

Massive AT&T Data Breach: Lessons Learned and the Role of Compliance in Prevention

The latest leak of more than 86 million AT&T customer records, which contained sensitive personal in ...

The 2025 India-Pakistan Cyber Conflict: Key Insights and Takeaways

The 2025 India-Pakistan Cyber Conflict: Key Insights and Takeaways

The India Pakistan cyber war 2025 unleashed an unprecedented cyber onslaught: over 10 crore (100 mil ...

Dissecting a Cyber Attack With a Perspective on Compliance

Dissecting a Cyber Attack With a Perspective on Compliance

A website breach We recently came across an interesting case with one of our EAP (Early Access P ...

Hidden Cybersecurity Risks in Hospitals from Unpatched Medical Devices

Hidden Cybersecurity Risks in Hospitals from Unpatched Medical Devices

A Silent Threat in the Healing Environment Hospitals, dedicated to healing, face a hidden risk a ...

SlopSquatting- A New Dimension to Supply-Chain Attacks

SlopSquatting- A New Dimension to Supply-Chain Attacks

Supply chain has been a prominent threat vector used in cyber-attacks. From the infamous SolarWinds ...

Cybersecurity

Cybersecurity

Compliance means following laws and guidelines set by government bodies. For example, in the U.S ...