CERT-In Directive – A Step to Strengthen India’s Cybersecurity Posture

The Indian Computer Emergency Response Team’s (CERT-In) recent Directions cover a host of measures aimed at strengthening the country’s cybersecurity. The larger objective is to capture the Indicator of Compromise (IOCs) and Threat Vectors of each incident and create an Intel database that could be used for securing the cyber defenses.

Published
Categorized as Blogs

Decoding the Anatomy of a Ransomware Attack

Ransomware is a multi-stage problem, that requires a multi-stage solution to effectively contain the attack at any stage. A typical ransomware attack goes through six distinct stages, and deconstructing each of these can help organizations strengthen their preparation and response strategies.

Published
Categorized as Blogs

Reinforcing Data Security with Data Discovery and Classification

Data is the most critical asset for any organization, and businesses cannot ensure its security if they are unaware of its existence and purpose. Data security refers to a set of controls or techniques that ensure the maintenance of confidentiality, integrity, and availability of data throughout its lifecycle.

Published
Categorized as Blogs

PCI DSS 4.0 – Key Changes Affecting Merchants and Service Providers and How They Should Respond?

While PCI DSS 4.0 standards mandate any business that stores, processes, or transmits cardholder data to make substantial changes to their security controls and policies, merchants and service providers are also required to implement stringent controls, especially around authentication, reporting of security events and intrusion-detection systems, among others.

Published
Categorized as Blogs

How are Ransomware Gangs Evolving their Expansion and Attack Strategy?

Ransomware gangs, through the expansion of toolset, adoption of new monetization models and use of advanced technology, are re-shaping the attack landscape – moving it away from the commodity-styled ‘spray and pray’ attacks to ones that are more targeted in scope and disruptive in impact.

Published
Categorized as Blogs