Email Security: Think Before You Click! Post author:Sameer Zama Post published:December 14, 2020 Post category:RNS Post comments:0 Comments Giants like Microsoft are transcending the graph with 9,410 Unique Phishing URLs in Q2, impersonated at twice the rate of Facebook. It is to be noted that the number is… Continue Reading Email Security: Think Before You Click!
The Power of Identity and Access Management Post author:Sameer Zama Post published:November 22, 2020 Post category:RNS Post comments:0 Comments The year 2020 has witnessed a plethora of “new normal”. Not only masks and social distancing, “Work from Anywhere” is the new normal. Until now, Work from Home and Bring… Continue Reading The Power of Identity and Access Management
DDoS Still Here, Still Effective and Still Making Money? Post author:Sameer Zama Post published:November 2, 2020 Post category:RNS Post comments:0 Comments A DDoS (distributed denial-of-service) attack can be defined as a malicious attempt in which multiple compromised computer systems attack a target, such as a server, website or other network resource,… Continue Reading DDoS Still Here, Still Effective and Still Making Money?
Identity & Access Management – Why Should Organizations Consider Investing in an IAM Program Post author:Sameer Zama Post published:November 2, 2020 Post category:RNS Post comments:0 Comments Organizations these days are undergoing massive digital transformations, wherein traditional business operating models are being replaced or incorporated with digital technology and strategy. This digitization is applicable to all stakeholders… Continue Reading Identity & Access Management – Why Should Organizations Consider Investing in an IAM Program
Defeating Threats in Hand Post author:Sameer Zama Post published:October 20, 2019 Post category:RNS Post comments:0 Comments In 2019, cyber-attacks are sophisticated and deceptive than ever. They move discreetly and seamlessly between vectors, while targeting organizations of all sizes. Advanced security strategy is required for countering aggressive… Continue Reading Defeating Threats in Hand
An Overview on Password Spraying Post author:Sameer Zama Post published:April 2, 2019 Post category:RNS Post comments:0 Comments An Overview on Password Spraying Attacks and Defending Against Them Earlier this month, famous software giant Citrix had its internal network compromised and breached by a group of international cyber… Continue Reading An Overview on Password Spraying
Your friends in IT SECURITY Post author:Sameer Zama Post published:September 4, 2018 Post category:RNS Post comments:0 Comments The digital age is upon us. Information Technology and Security two big technical jargons to deal in. Especially when you are a cyber-security professional who (more…) Continue Reading Your friends in IT SECURITY
Do you have secrets in your Mobile? Is anyone else watching them apart from you???? Post author:Sameer Zama Post published:September 4, 2018 Post category:RNS Post comments:0 Comments For today’s new generation mobile phone is one device which serves the purpose of all. An android or an IOS smartphone is your sustenance—it’s your calendar, reminder, (more…) Continue Reading Do you have secrets in your Mobile? Is anyone else watching them apart from you????
Rules to Follow in Information Security Post author:Sameer Zama Post published:August 13, 2018 Post category:RNS Post comments:2 Comments 1. Say to yourself I am vulnerable”, I am a potential Target “, I am at Risk Always. Never ever assume or believe you are Secure. 100 % Information Security is a myth. The (more…) Continue Reading Rules to Follow in Information Security