Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Data hacked during EPFO-Aadhar seeding
Cyber criminals seem to have hacked the EPFO data which holds information...
-
Smartly defining RPO and RTO for Disaster Recovery Plans
Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most...
-
Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails
Be careful when you receive attachments to an email, it can be...
-
CIOs must run a customer centric business
It is high time for CIOs to run a customer centric business....
-
Indian Government needs to give cyber security an equal priority to border security
Digital India is no more a dream but carving into an absolute...
-
Rarog – A cryptomining Trojan is out in the wild
A malware family Rarog is out in the internet and being excessively...
-
Blog 10 April 2017 Why do companies need responsive web design? -
Blog 10 April 2017 Matrix Ransomware: Spreading to PCs through Malicious Shortcuts -
Blog 9 April 2017 What is Penetration Testing? And Why is it important for your organization? -
Blog 9 April 2017 Dangers of Crypto-Ransomware and ways companies can avoid it! -
Blog 7 April 2017 Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017! -
Blog 5 April 2017 A classic ICICI Bank Email phishing in 2017
-
Why do companies need responsive web design?Responsive web design is an approach to creating web sites which can...
-
Matrix Ransomware: Spreading to PCs through Malicious ShortcutsThe latest addition to the growing threat of ransomware is the Matrix...
-
What is Penetration Testing? And Why is it important for your organization?Penetration testing or commonly known as pen testing is another important way...
-
Dangers of Crypto-Ransomware and ways companies can avoid it!Money makes ransomware the lucrative cyber theft option. Crypto-Ransomware is a type...
-
Red-team Exercise: Explore your companies Vulnerabilities to Cyber-attack in 2017!Red-team cyber security testing is optimally designed to measure how well your...
-
A classic ICICI Bank Email phishing in 2017Are you using internet banking ? How secure are your financial transactions ? Do you scan...