Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid

Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid

Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid Equifax hack needs no introduction. One third of American lost their social security number due to this single breach. Here’s some of the top mistakes/learning from Equifax breach from my perspective. I would invite all of you to also add your comments and thoughts.   1. PatchRead more about Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid[…]

Cyber Security Maturity Report of Indian Industry (2017)

Cyber Security Maturity Report of Indian Industry (2017)

  In Cyber Security Maturity Report of Indian Industry (2017), we’ve researched the current cybersecurity maturity of Indian industry based on the kind of technical security controls they have in place against modern day attacks. Cyber security is now a persistent business risk, across organizations of all size, large or small. To  secure businesses, youRead more about Cyber Security Maturity Report of Indian Industry (2017)[…]

Technology Stack for Ransomware Protection

Technology Stack for Ransomware Protection

With Ransomware attacks becoming increasingly frequent, we thought of putting together a list of technologies that can help organizations protect themselves against ransomware attacks. Please note that even though this blog discusses technology measures, this does NOT mean people & process are secondary. There’s no single technology that can protect against ransomware, and for effectiveRead more about Technology Stack for Ransomware Protection[…]

Top 10 Metrics for your Vulnerability Management Program

Top 10 Metrics for your Vulnerability Management Program

Security Metrics are essential for quantitative measurement of any security program. Below, we’ve listed some security metrics (in no particular order) which can be used to measure the performance of your Vulnerability Management (VM) program. For demonstrating performance improvements, you can create dashboards / graphs which can show trends over time for some of these metrics.Read more about Top 10 Metrics for your Vulnerability Management Program[…]