Posts

Showing posts from January, 2023

Everyone’s calling This the next big thing in Security. What is it?

Image
Technologies and buzzwords come and go, but, in technology terms, some often make the cut and go into the big league. Think of cloud computing 20 years ago, or zero trust around 5 years ago. Today everyone is just gushing over it and calling it the next battleground and the tool for the growth and transformation of their business.  Just like them, there is a new buzzword out there, that is claiming to change security like anything. (Pronounced SASSY) SASE is the latest fad to get viral status, with multiple tech forums calling 2023 the year when it finally takes off. So what is SASE all about? This blog post will help to unravel this for you.  What is SASE? This was first described by Gartner in the August 2019 report The Future of Network Security in the Cloud and expanded upon in their 2021 Strategic Roadmap for SASE Convergence. Gartner defines SASE as “The secure access service edge is an emerging offering combining comprehensive WAN capabilities with comprehensive network security

Episode 2 - Security Concepts: Threat, Vulnerability, Risk, Threat Agent & Countermeasures

Image
This episode talks about the basic concepts of information security - Threat, Vulnerability, Risk, Threat Agent & Countermeasures. 

Cybersecurity burnout is real. I lived through it !!!

Image
What does a typical workday in the life of a CISO look like? Most CISOs would agree that there are myriad things that are constantly begging for attention in their work, and yet have 20 extra things that land up in their inbox that need to be sorted out immediately - High impact data leakages, discussion with a prospective customer, a minor escalation, and Oh Yes (or No !!, not again), another review with CEO/COO/CIO/Board of directors and what not!! This is in addition to the millions of discussions or calls they are pulled in on TEAMS/ZOOM etc. etc. and the zillions of emails asking for guidance on every aspect. Did I miss the travel itinerary that needs to be taken care of? Hold on, I know these expressions !! You are either smirking that I missed so many things or just smiling that you don’t deal with any of this stuff, but so much other stuff that I have not even touched upon. Whatever the case, you would agree that cybersecurity professionals have a tough job that involves intens

Episode 1 - The Security Triad

Image
This episode talks about the 3 pillars of information security - Confidentiality, Integrity, and Availability. 

Is Cloud storage immune to Ransomware attacks? ( It’s NOT)

Image
How many customers are migrating to the cloud today? Well, mostly all of them. The reasons are multifold - cost-cutting, digital transformation, online presence, backups, etc. Companies are moving their entire enterprise data in a lot of cases entirely to the cloud and in some cases, even the most sensitive data is available online. Many organizations suffer from this myth that once the data is moved to the cloud, it's safe from attacks and especially ransomware attacks. They also believe that the cloud provider will take care of all the security needs from a data protection perspective. Well, this blog post will analyze in detail and try to explain that the cloud is not a panacea to all your security needs and debunk certain myths related to cloud security. How Big is the cloud? A quick Google search will help you uncover some mind-blowing facts: Globally, the cloud computing market will surpass $1 trillion by 2028. (Precedence Research) The global cloud computing market grew from

CyberInsurance Murkiness to Shape Shifting Ransomware - What 2023 holds for us in terms of Cybersecurity ?

Image
Well, we all love predictions, don’t we? The new year rings in and there is a flood of predictions from all ends - financial trends, fashion trends, puppy trends, climate trends, and whatnot!! How can cybersecurity be far behind? Google “Cybersecurity Trends 2023” and you will find myriad results on this. What does this blog post offer then?  Well, I thought it to write it from my perspective, rather than making it to upsell the services which these companies offer while writing such articles. An antivirus company’s security trends are all focused on malware and how that company can help you overcome it. A SIEM company wants you to use the new tools and so forth… Here is a set of predictions from my perspective: CyberSecurity Talent Supply Issues will continue to rise and the payouts will increase drastically While tech companies may be laying off employees, cybersecurity will continue to thrive and companies will have a hard time finding talent. The attrition levels will rise along wi