Cybersecurity demystified. One story at a time.

    • All
    • Identity
    • Cloud
    • Threat
    • Zero Trust
    • Emerging
    • Artificial Intelligence

    No results found

    •  

      Phishing vs. pharming: Which is the real scamdemic?

      Read more
      By Daya Kannan
      Published on Jan 12, 2023
       
    •  

      Reinforcing blockchain privacy with zero-knowledge proof

      Read more
      By Manasa
      Published on Jan 12, 2023
       
    •  

      Rise in adoption of managed security services

      Read more
      By Rahini
      Published on Jan 12, 2023
       
    •  

      Why cybersecurity must start from hardware design

      Read more
      By Thamizh
      Published on Jan 12, 2023
       
    •  

      Organizations must prioritize cyber insurance. Here's why

      Read more
      By Rahini
      Published on Jan 12, 2023
       
    •  

      Quantum Resistant Ledger: A quantum-proof blockchain frontier

      Read more
      By Maha
      Published on Jan 12, 2023
       
    •  

      Get ahead of security gaps with Breach and Attack Simulation

      Read more
      By Dhilip
      Published on Jan 8, 2023
       
    •  

      Geotargeted threats: Why attackers want to know your whereabouts

      Read more
      By Aravind
      Published on Jan 8, 2023
       
    •  

      Insider attacks: Healthcare sector's biggest adversary

      Read more
      By Dhilip
      Published on Jan 8, 2023
       
    •  

      Cyber risks that can threaten the metaverse

      Read more
      By Abhimanyu
      Published on Jan 8, 2023
       
    •  

      Data fabric for hyper-contextual cybersecurity

      Read more
      By Aravind
      Published on Jan 4, 2023
       
    •  

      Disinformation as a cybersecurity threat

      Read more
      By Selina
      Published on Jan 4, 2023
       
    •  

      Techniques to secure distributed enterprises

      Read more
      By Dhilip
      Published on Jan 4, 2023
       
    •  

      Extending Zero Trust to APIs

      Read more
      By Manasa
      Published on Jan 4, 2023
       
    •  

      Why software supply chain needs a Zero Trust approach

      Read more
      By Rahini
      Published on Jan 4, 2023
       
    •  

      Is MFA the gateway to a passwordless future?

      Read more
      By Aravind
      Published on Jan 4, 2023
       
    •  

      Why IAM is a critical need for cloud security

      Read more
      By Daya Kannan
      Published on Jan 4, 2023
       
    •  

      What is ITDR, and how does it elevate cybersecurity?

      Read more
      By Thamizh
      Published on Jan 4, 2023
       
    •  

      The adoption of cloud VPNs in businesses

      Read more
      By Megha
      Published on Jan 4, 2023
       
    •  

      Secure your crypto assets from financial threats: Here's how

      Since its inception in 2009, cryptocurrency has gained significance as a viable and legitimate medium of transaction due to its adoption

      Read more
      By Aravind
      Published on March 21, 2022
       
    •  

      Ransomware-as-a-Service:
      Rise of a lethal
      cyberweapon

      Ransomware is malware that modifies data on a victim's device and renders it inaccessible until a ransom is paid to reinstate access to the data.

      Read more
      By Dharuna
      Published on March 21, 2022
       
    •  

      How mobile phones
      foster APT attacks:
      An overview

      Mobile phones are no longer just phones. With the increase in remote work and adoption of BYOD policies, mobile phones have become entry points to access corporate data and resources.

      Read more
      By Dhilip
      Published on March 21, 2022
       
    •  

      Supply chain attacks:
      The invisible threat
      to networks

      In networking parlance, supply chain refers to the combined effort of resources (hardware and software), storage (on-cloud and on-premises)

      Read more
      By Aravind
      Published on March 21, 2022
       
    •  

      How to mitigate
      common application
      security vulnerabilities

      Web and mobile applications are becoming increasingly feature-rich to accommodate growing consumer demands.

      Read more
      By Kavin
      Published on March 21, 2022
       
    •  

      Ensure 5G security with Zero Trust architecture

      5G is the next generation of mobile wireless technology that will drive a new digital transformation. Thanks to its high speed and better

      Read more
      By Jenny
      Published on March 21, 2022
       
    •  

      Prioritize protecting C-level Executives, the prime target of Cybercriminals

      Today, hackers are targeting the weakest links inside organizations to gain access to their networks. Top-level executives, who typically

      Read more
      By Megha
      Published on March 21, 2022
       
    •  

      IDaaS: The upcoming buzzword in Identity Access Management

      Identity management is a common term that encapsulates the technologies or solutions required to solve the problems pertaining to

      Read more
      By Dharuna
      Published on March 21, 2022
       
    •  

      Why Zero-Trust is a pre-requisite for cloud-native architectures

      Over the past decade, the global tech industry has shifted to being service-oriented. We find every product being offered as a service

      Read more
      By Rahini
      Published on March 21, 2022
       
    •  

      Secure IoT for a safer cyberspace: The challenges and solutions

      The idea of connectivity is not just limited to computers, it also extends to the appliances we use in day-to-day life contributing to a smarter

      Read more
      By Aravind
      Published on March 21, 2022
       
    •  

      Understanding cybersecurity mesh architecture and its rising acceptance

      IT security is constantly evolving and failing to keep abreast of changes can have costly consequences. The security methodologies and

      Read more
      By Dhilip
      Published on March 21, 2022
       
    •  

      Role of privileged access management in Zero Trust

      In light of the recent pandemic, most companies have adopted the hybrid work model. Employees are working from remote locations

      Read more
      By Jenny
      Published on March 21, 2022
       
    •  

      SASE and Zero Trust: The perfect match

      Hybrid work models and cloud computing have drastically changed how organizations implement their network security strategies

      Read more
      By Kavin
      Published on March 21, 2022
       
    •  

      Privacy Laws: The watchdog of authentication evolution

      In light of the recent pandemic, most companies have adopted the hybrid work model. Employees are working from remote locations

      Read more
      By Aravind
      Published on March 21, 2022
       
    •  

      Cybersecurity predictions for 2022 and beyond

      Change is the only constant—this has rung true in many facets of 2021. Things are no different for the cybersecurity landscape

      Read more
      By Shruthi
      Published on March 21, 2022
       
    •  

      Decentralizing digital identities with blockchain technology

      In light of the recent pandemic, most companies have adopted the hybrid work model. Employees are working from remote locations

      Read more
      By Megha
      Published on March 21, 2022
       
    •  

      Implementing contextual awareness to render dynamic security decisions

      The widespread adoption of hybrid workplace models and trends, such as BYOD, inadvertently result in an increasingly complex threat

      Read more
      By Manasa
      Published on March 21, 2022
       
    •  

      The role of machine identity management in today's identity security

      Authentication is the first step to keeping your data secure by restricting access to sensitive resources. Users are authenticated

      Read more
      By Dhilip
      Published on March 21, 2022
       
    •  

      How the advent of new technologies has impacted information security

      Information security has been a burning issue in recent times, and its importance is often talked about in our increasingly digitized world

      Read more
      By Jenny
      Published on March 21, 2022
       
    •  

      Level up your organization's access control policies

      In networking parlance, supply chain refers to the combined effort of resources (hardware and software), storage

      Read more
      By Rahini
      Published on March 21, 2022
       
    •  

      Cyberattacks that ushered in legislative reforms

      As cybernativity spreads its wings across the world with the increasing accessibility of the internet, IoT, and other digital resources

      Read more
      By Aravind
      Published on March 21, 2022
       
    •  

      The transition of wars from battlefield to cyberspace

      In networking parlance, supply chain refers to the combined effort of resources (hardware and software), storage

      Read more
      By Manasa
      Published on March 21, 2022
       
    •  

      Big data: Making cybersecurity dynamic

      Web and mobile applications are becoming increasingly feature-rich to accommodate growing consumer demands

      Read more
      By Aravind
      Published on March 21, 2022
       
    •  

      How are countries planning to regulate AI? An overview

      Ever since ChatGPT, the generative-AI-powered natural language chatbot designed by Microsoft-backed OpenAI, was publicly released.

      Read more
      By Aravind
      Published on July 17, 2023
       
    •  

      Exploring ChatGPT, Part 2: Nemesis

      The first part of the Exploring ChatGPT series, Genesis, discussed the technology behind OpenAI's ChatGPT.

      Read more
      By Ronak
      Published on July 17, 2023
       
    •  

      Exploring ChatGPT, Part 1: Genesis

      For mankind, technology is an effective way to build a better future.

      Read more
      By Ronak
      Published on July 17, 2023
       
    •  

      Phases of a DDoS attack, explained

      5G is the next generation of mobile wireless technology that will drive a new digital transformation.

      Read more
      By Dharuna
      Published on March 21, 2022
       

    Top Stories

    2020 Zoho Corporation Pvt. Ltd. All rights reserved.