Unveiling the Role of Digital Forensics in Cybersecurity
Digital forensic experts often cite the case of Dennis Rader, the infamous killer, who came undone thanks to a forensic investigation. Often referred to by the sobriquet BKT, because of his preferred modus operandi of binding, torturing, and killing his victims, he committed a series of calculated and heinous murders in the seventies and eighties, […]
The Growing Threat of Mobile Malware
Though it was relatively harmless in terms of the devastation that its modern cousins can wreak, the Cabir worm is regarded as the forerunner of malware in mobile devices. Given its name by Kapersky, the worm spread on mobile devices running the Symbian OS systems via Bluetooth. The worm caused the battery of the phone […]
The Danger of Encrypting Viruses in Modern Cybersecurity
Introduction In the Deep Space Nine episode of the hit sci-fi series Star Trek, a virus known as Cascade completely wipes out computer data on the USS Defiant, necessitating that it be brought back to base by another spaceship. The infection was not a part of the imagination of a screenwriter. Cascade was in fact […]
The Importance of Managing Non-Human Identities in Modern Cybersecurity
Introduction Half a century ago, no one would have imagined how times would change in the world of computers. Once believed that computers were the domain of human beings – their prerogative to access, operate and manage – it is remarkable how today’s scenario is such a far cry from those early days. Take the […]
How Compliance Automation Can Revolutionize Organizational Efficiency
Introduction Amongst the most talked-about requirements of an organization, is the need to be compliant. Every mature industry now calls for organizations within its folds to follow regulations that ensure it is compliant with industry standards, best practices, and certified processes. Compliance teams are akin to watchdogs – constantly on the lookout for grey areas […]
Understanding Chatbots: Opportunities and Challenges
A decade ago, no one would have dreamed that commercial and other organizations would use a virtual assistant to answer queries which until then were the sole responsibility of a salesperson, an office telephone operator, or a receptionist. While organizations still deploy the latter in their front offices, taking cognizance that human interfaces are still […]
Open Source Software in a Cyber-Conscious World
Open Source Software in a Cyber-conscious World The March 2017 breach (1) of credit giant Equifax that resulted in the loss of an estimated 143 million personal records is widely cited in Open Source Software (OSS) circles as one reason for vulnerability vigilance. The breach occurred when attackers used a consumer complaint web portal to […]
Building a Global Cybersecurity Plan – Why Collaboration is Key
Needed : A global plan for cybersecurity The story of notorious French drug dealer Charles Sobhraj will go down as one of the biggest manhunts in the history of modern crime. The ace conman had successfully evaded police across the world, before being apprehended by Indian sleuths first in the beach town of Goa, and […]
A Roadmap for Bridging the Gap Between the Demand and Supply of Cybersecurity Talent
Introduction The relationship between demand and supply and their price sensitivity, made famous by early thinkers and economists like Adam Smith and Alfred Marshall, among others of that era, applies as much to cybersecurity talent as to any other product or service. It is however relevant to start a discussion on the subject by looking […]
Cybersecurity and the C-Suite: A Symbiotic Relationship
The 2019 cyber incident which witnessed Chris Hylen stepping down as CEO of the California-based cybersecurity software services company Imperva, following a massive hack of their customer email, password, and sensitive key data due to a misconfiguration of their cloud service, brought into sharp focus the responsibility of the top brass when it comes to […]