Showing Posts From
Cybersecurity
-
Shankar Jayaraman - 22 Jul, 2025
Why Your GRC Tool Shouldn't Hold Your Keys? How CISOGenie is changing the game?
When I was a CISO, I found myself in a tough spot. I was really eager to find a GRC tool that could ...
-
Shankar Jayaraman - 28 Jun, 2025
Indo-Pak & Israel-Iran: Cyber Wars Follow the Same Script?
Cyber attacks on critical infrastructure are no longer secondary acts of disruption, they are now fr ...
-
Balachandra Sivakumar - 18 Jun, 2025
Massive AT&T Data Breach: Lessons Learned and the Role of Compliance in Prevention
The latest leak of more than 86 million AT&T customer records, which contained sensitive personal in ...
-
Shankar Jayaraman - 13 Jun, 2025
The 2025 India-Pakistan Cyber Conflict: Key Insights and Takeaways
The India Pakistan cyber war 2025 unleashed an unprecedented cyber onslaught: over 10 crore (100 mil ...
-
Balachandra Sivakumar - 17 May, 2025
Dissecting a Cyber Attack With a Perspective on Compliance
A website breach We recently came across an interesting case with one of our EAP (Early Access P ...
-
Shankar Jayaraman - 12 May, 2025
Hidden Cybersecurity Risks in Hospitals from Unpatched Medical Devices
A Silent Threat in the Healing Environment Hospitals, dedicated to healing, face a hidden risk a ...
-
Balachandra Sivakumar - 26 Apr, 2025
SlopSquatting- A New Dimension to Supply-Chain Attacks
Supply chain has been a prominent threat vector used in cyber-attacks. From the infamous SolarWinds ...
-
Shankar Jayaraman - 15 Mar, 2025
Cybersecurity
Compliance means following laws and guidelines set by government bodies. For example, in the U.S ...