
-
Shankar Jayaraman
- 02 Jun, 2025
Shadow AI - The Darker Side of AI Awesomeness
The year 2018 was a watershed moment in the evolution of Large Language Models (LLMs), with the arri ...

-
Shankar Jayaraman
- 17 May, 2025
Bridging The Gap : IT and OT Compliance Collaboration
The Historical IT/OT Divide Operational Technology (OT) and Information Technology (IT) have his ...

-
Balachandra Sivakumar
- 17 May, 2025
Dissecting a Cyber Attack With a Perspective on Compliance
A website breach We recently came across an interesting case with one of our EAP (Early Access P ...

-
Shankar Jayaraman
- 12 May, 2025
Hidden Cybersecurity Risks in Hospitals from Unpatched Medical Devices
A Silent Threat in the Healing Environment Hospitals, dedicated to healing, face a hidden risk a ...

-
Balachandra Sivakumar
- 26 Apr, 2025
SlopSquatting- A New Dimension to Supply-Chain Attacks
Supply chain has been a prominent threat vector used in cyber-attacks. From the infamous SolarWinds ...

-
Balachandra Sivakumar
- 22 Apr, 2025
MITRE CVE - Is Your GRC Ready for a World Without a Stable CVE?
A Close Call for the Cybersecurity Industry Last week, the cybersecurity industry faced a huge r ...