Blog
Securing the Autonomous World by Reinforcing Cybersecurity
by Nitish Deshpande
With the increase in automation, there are new cybersecurity threats that need to be addressed, and in order to address the new cybersecurity threats, there are a few technological challenges that need to be understood. The first challenge is the availability and quality of training data that is required for training cybersecurity-related ML models. This data almost always contains massive amounts of sensitive information – intellectual property, PII, or otherwise strictly regulated data – which companies aren’t willing to share with security vendors. Formal...
Blog
Oracle Access Governance: Cloud-Based Centralized Visibility
by Nitish Deshpande
In the last few years, several prominent security-related incidents have originated from inefficient governance of identities such as the Equifax data breach in 2017 where data of 147 million identities was compromised or the Microsoft Exchange Server data breach in 2021 which affected 30,000 organizations from 150 countries. Data theft, loss of personally identifiable information (PII), and industrial espionage through unauthorized access are severe security risks in every industry. Organizations struggle with centralized visibility for identifying who has access to what, who has accessed...
Blog
Ransomware in 2022
by Nitish Deshpande
Cybercriminals continue to cause disruption for organizations in 2022. Depending on the cyberattack type, those disruptions lead to various consequences, such as reputational/brand damage, financial losses, and monetary penalties. One of the most prevalent types of cyberattacks is ransomware, accounting for approximately 10% of all cyberattacks in 2021. Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption keys. Palo Alto Networks states...
Blog
Log4j Vulnerability: It Is Still a Threat
by Nitish Deshpande
The Log4j vulnerability, was first detected in December 2021. Log4j is an open-source Java library that is widely used by developers to monitor apps and captures logs. Cybersecurity experts classified it as a critical severity due to its vulnerability to remote code execution (RCE) attacks, local code execution (LCE) attacks, and information leakage. Millions of attack attempts exploiting this vulnerability were reported . Microsoft identified a group of attackers from China that used this weakness as a back door to inflict organizations with Nightsky ransomware. Due to being...
Blog
Here’s Why DDoS Attacks Have Become a Bigger Threat
by Nitish Deshpande
DDoS (Distributed Denial of Service) attacks are no longer top of mind; however, today DDoS attacks are an even bigger threat than ever before. The pandemic has accelerated digital transformation due to growth in digital services. The ever-increasing number of devices being exposed to the internet, the ever-growing dependency of organizations on these digital services as a virtual interface to customers, consumers, and citizens, the shift to remote work/work from home and the growth in importance of cryptocurrencies. All these factors have led to a continuous increase in the number and...