Author: Aravindh Ramachandran

Cybersecurity Trends 2020: What’s in Store

The year 2019 has been a significant one in the technology world, with several high profile cases grabbing headlines. In…

6 years ago

5 Identity Governance & Administration Mistakes You Should Avoid

Identity governance and administration (IGA) is the policy-based implementation of user identity and access to ensure security and compliance across…

6 years ago

Prevent Online Identity Theft with Akku

Online identity theft, simply put, is impersonation on an online platform. If someone else pretends to be you -- either…

7 years ago

Agent-based Cloud Security Solution? No thanks!

If your organization relies on the cloud for a majority of its operations, you may want to look closer at…

7 years ago

Hashing And Salting – The What And How

“irgvctxmsr” - sounds like gibberish, doesn’t it? But if you were to decrypt this string using a mono-alphabet shift cipher…

7 years ago

3 Important steps to improve network security against brute-force attacks

A brute-force attack is a type of cybercrime which involves automated hacking activity using bots. The primary aim of a…

7 years ago

5 Cloud Security Myths Busted

One of the main reasons for a number of traditional, older enterprises still being wary of cloud computing is the…

7 years ago

Cloud Security Solutions – Why do you need them?

Migration to the cloud is no longer an emerging trend. It is now a well-established method of running the operations…

7 years ago

YouTube Usage at the Office is No Longer a Worry!

Using YouTube at the office is often viewed negatively, both because of it results in heavy bandwidth consumption, and in…

7 years ago