Since the inception of the 2020 era, time can briefly be divided into three phases viz, the pre-covid times rather the happy times, the covid times (test of time) and finally the post covid time (recovery phase). With the vaccination around, things are kind of getting back to normal and the businesses are beginning toContinue reading “Cybersecurity in the post COVID era – The need for the years!”
Author Archives: The Art of Cyber-Space
India’s power grid targeted by Chinese hackers – Overview of the malware attack
People living in Mumbai, the financial capital of India did experience a power surge which affected almost the entirety of the city. In addition to the existing border tensions, a cybersecurity research company (US based firm) has reported that state sponsored Chinese hackers have attempted to take down the national power grid. The China linkedContinue reading “India’s power grid targeted by Chinese hackers – Overview of the malware attack”
Recent breach in government data – critical vulnerabilities still to be fixed
Just a couple of days back, security research team Sakura Samurai had found some critical vulnerabilities. The scrutiny was performed through RVDP also known as Responsible Vulnerability Disclosure Program. The list is believed to be legally provided to the security researcher. One of the members Robert Willis had reported that he was able to gainContinue reading “Recent breach in government data – critical vulnerabilities still to be fixed”
Identity and access management and Internet of Things – An explorative study
Today with the expanding perimeter of the threat landscape and ever increasing digitization of data, the need for cybersecurity is becoming more than important and a factor that can’t be ignored. A lot of these threats are primarily as a result of insider threats and there’s no second thoughts that Identity and access management (IAM)Continue reading “Identity and access management and Internet of Things – An explorative study”
New vulnerabilities being exploited in Solarwinds software – A review
It wasn’t that long, the Solarwinds cyberattack was all over the news, and now there are new vulnerabilities that are being exploited. Researchers from Trustwave have identified three new critical flaws. The vulnerabilities has been addressed to potentially provide access to an attacker leading to compromise the network infrastructure, causing distress to its consumers. SolarwindsContinue reading “New vulnerabilities being exploited in Solarwinds software – A review”
Threat Intelligence in cybersecurity: A key role in incident response
Threat Intelligence is turning into a pervasive ability in numerous security aspects. It is a critical part of security engineering that helps security along with risk management, and specialized experts with the pace of exploding research. It was the time at a point when the dark web and malign activities were detonating, indicating the restrictionsContinue reading “Threat Intelligence in cybersecurity: A key role in incident response”
Deep web vs the Dark web – A snippet of the mysterious exploration
You may have heard these ideas being tossed around, however one might not actually have a clue what they are, then again, they sound hostile. One may presume that it’s a spot (or places) where malicious attackers wander or one may have additionally known about the claimed intellectual dark web’, yet that simply makes mattersContinue reading “Deep web vs the Dark web – A snippet of the mysterious exploration”
Future trends of blockchain technology in cybersecurity – An impression around BaaS
There’s no doubt or hesitancy that blockchain technology has streamlined the payment industry in the digital world. Blockchain technology is a distributed and decentralized ledger framework that can record exchanges between different computers. Blockchain began as the innovation behind bitcoin yet has prevalently developed into a promising innovation in the cybersecurity space. Eminently, human errorsContinue reading “Future trends of blockchain technology in cybersecurity – An impression around BaaS”
Cybersecurity in the AEC industry – A deep dive around Construction 4.0
The construction industry has already made a shift towards digitization and automation also coined as Construction 4.0. An amalgamation of three domains Architecture, Engineering and Construction aka AEC industry has stepped on the pedal and is bringing in technological applications towards modernization. The umbrella concept for the current happenings to digitize construction related activities akaContinue reading “Cybersecurity in the AEC industry – A deep dive around Construction 4.0”
Application of cognitive models for data security – A cryptographic review
With growing demand to secure data and information, there have been advancements around the authentication mechanisms including biometric authentication, secure access token and also MFA or multi-factor authentication. One of the research papers had mentioned the use of cognitive models as an authentication mechanism which will add an effective layer of encryption. This post isContinue reading “Application of cognitive models for data security – A cryptographic review”