Category: Cybersecurity Insights

Agent-based Cloud Security Solution? No thanks!

If your organization relies on the cloud for a majority of its operations, you may want to look closer at…

7 years ago

Beware of Credential Stuffing

In recent times, you might have noticed user accounts being compromised by the millions, and yet companies refute these claims…

7 years ago

7 Ways in Which Akku can Help you Address Security Challenges

While it is natural to feel apprehensive on the cloud, especially if you are new to it, remember that there…

7 years ago

Hashing And Salting – The What And How

“irgvctxmsr” - sounds like gibberish, doesn’t it? But if you were to decrypt this string using a mono-alphabet shift cipher…

7 years ago

3 Important steps to improve network security against brute-force attacks

A brute-force attack is a type of cybercrime which involves automated hacking activity using bots. The primary aim of a…

7 years ago

What is Zero Trust Security?

As organizations increasingly place their data and applications across multiple locations on the cloud, zero trust security is rapidly gaining…

7 years ago

Why is multi-factor authentication indispensable?

Ever heard of the butterfly theory? A single flap of a butterfly’s wings in Australia has the potential to cause…

7 years ago

Why data breaches happen & what you can do to stop them

War seems to have taken a new form in the Information age. Large corporations have reported increased data breaches in…

7 years ago

Password Managers can be Hacked. Now What?

On average, every person has 7.6 accounts - that’s a lot of user IDs and passwords for an individual! Remembering…

7 years ago

5 Cloud Security Myths Busted

One of the main reasons for a number of traditional, older enterprises still being wary of cloud computing is the…

7 years ago