Cloud Security Simplified!

According to Gartner, pandemic-induced surge in public cloud spend is predicted to run until 2024 (reference: ComputerWeekly). This increase is fueled by organizations wanting to conserve cash, optimize IT costs and support & secure a remote workforce and ensure resiliency. Increased cloud footprint translates to an increased attack surface for most organizations. Cyber attacks on cloud […]

Cyber Insurance and Proactive Security: Not an either or proposition.

Earlier last month, CNA Financial reportedly paid a $40 million ransom after a ransomware attack and the CEO of Colonial Pipeline Co. admitted that his firm paid $4.4 million to a criminal gang after a ransomware attack led the company to shut down its 5,500 mile-long pipeline for nearly a week. It’s not clear whether Colonial Pipeline and CNA […]

Guidance on preventing or limiting the impact of ransomware attacks.

In view of two major ransomware attacks, the Colonial pipeline and JBS, it’s time to refocus on proactive cyber security as time and again reactive security controls have failed to prevent large scale and targeted ransomeware attacks. Here is a glimpse of the state of things when it comes to ransomware attacks: (Courtesy: Combating Ransomware – Ransomware Task Force […]

Malware and Public Vulnerabilities – Made for each other

Understanding the impact and relevance between public vulnerabilities and their weaponization into threats such as different types of malware’s is important to understand the level of investment and the type of focus that is needed for vulnerability management. Setting the Context Often malware is associated with brute force attacks such as compromised credentials to gain […]

Third party and supply chain security – a different approach

Much has been reported, blogged and pod-casted about the recent high-profile cyber security events surrounding Solarwinds. However, for many including myself, there has been a sense of foreboding about such an event for some time now, given the state of third party security. The response from the stakeholders indicate that while this event is still […]

REvil / Sodinokibi: A case for better proactive cyber security

“An ounce of prevention is better than a pound of cure”. Whatever way you quote this age-old adage, its hard to argue against it. So it goes in the cyber security context as well – preventing cyber threats is always going to be better than curing them. For more than a decade now, we have […]

THE NEW WEB – Vulnerabilities in Open Source Software

Open Source technologies are becoming the backbone of all modern day solutions. It has huge advantages since the “write-once and use it across the board” approach fosters code reuse. In many cases these open source technologies get extended to adapt to specific requirements and customizations, this has similar traits to polymorphism brought in by modern […]