Posts

Showing posts from June, 2024

Supply chain cyber security: Steps for mitigation and best practices

The digital age has brought about a double-edged sword for supply chains. On one hand, it has fostered greater interconnectedness and efficiency. On the other hand, it has opened new avenues for cyberattacks. New-age threats like cyber-ransom are emerging alongside more traditional threats like supplier risks, targeting the supply chain’s digital and physical aspects. Globalization and interconnectedness have further contributed to the significant increase in the attack surface of supply chains, and this vast number of touchpoints creates more opportunities for vulnerabilities and breaches. A supply chain crisis can devastate a business, leading to weeks of downtime, operational shutdowns, reputational damage, and financial losses. Potential vulnerabilities include unauthorized access to enterprise resource planning (ERP) systems, backdoor exploitation, open-source vulnerabilities, and malware injection within proprietary systems. However, a purely IT-centric approach to securing suppl...

Cryptocurrency Security: Risks and Best Practices

 By Mr. Abhishek Srinivasan Cryptocurrencies gained momentum in 2009 with the onset of Bitcoin, rapidly gaining popularity as an investment option due to their unique characteristics: decentralization, digital format, and secure token-based transactions. This combination offered an unprecedented level of convenience and control for investors. However, the world of cryptocurrency is not without its dangers. While generally secure, there are inherent threats that can leave users wary. For instance, recent research shows that 2022 noted 199 crypto thefts, and 2023 noted a sharp rise with 283 incidents recorded, resulting in millions of dollars in loss.  Therefore, understanding potential pitfalls and implementing preventative measures will equip users with the knowledge to make informed decisions and navigate cryptocurrency investment’s promising yet volatile landscape.  Cryptocurrency Risks   While cryptocurrency offers strong cryptographic security, its lack of wides...

Array Networks Announces the New Country Manager for India

 Array Networks, a globally renowned leader in application delivery and security products , announced the appointment of Mr. Hrishikesh Jadhav as the new Country Manager for India. Hrishikesh Jadhav has been a cornerstone of Array India’s success, with an impressive 14-year tenure marked by unwavering dedication, outstanding performance, and steadfast commitment. Throughout his journey within Array, he has excelled in pivotal roles, including Regional Sales Director – West & South India, and Regional Sales Manager, leaving an indelible mark on our organization’s growth trajectory. In his new role, Hrishikesh will spearhead Array India’s initiatives aimed at implementing new sales strategies and techniques, enhancing customer engagement, faster acquisitions and expanding market presence across the country. Hrishikesh will report directly to Shibu Paul, Vice President – International Sales at Array. Mr. Shibu Paul, VP – International Sales, expressed his confidence in Hrish...

Array Networks Announces the New Country Manager for India

 Bengaluru, India – May 07, 2024 Array Networks, a globally renowned leader in application delivery and security products , announced the appointment of Mr. Hrishikesh Jadhav as the new Country Manager for India. Hrishikesh Jadhav has been a cornerstone of Array India’s success, with an impressive 14-year tenure marked by unwavering dedication, outstanding performance, and steadfast commitment. Throughout his journey within Array, he has excelled in pivotal roles, including Regional Sales Director – West & South India, and Regional Sales Manager, leaving an indelible mark on our organization's growth trajectory. In his new role, Hrishikesh will spearhead Array India’s initiatives aimed at implementing new sales strategies and techniques, enhancing customer engagement, faster acquisitions and expanding market presence across the country. Hrishikesh will report directly to Shibu Paul, Vice President - International Sales at Array. Mr. Shibu Paul, VP – International Sales, ...

Brute Force Attacks: A Persistent Threat in the Digital Age

  Brute force attacks remain one of the most prevalent forms of cyber attacks despite being one of the oldest. Its effectiveness stems from two key factors: a low barrier to entry and the continued use of weak passwords. Unlike more sophisticated attacks that exploit vulnerabilities, brute force requires minimal technical expertise, making it accessible to a wide range of attackers. Moreover, the tendency to use simple and easy-to-remember passwords significantly increases the success rate of brute-force attacks. Research shows that “123456” continues to be the most commonly used password worldwide, highlighting the need for stronger password practices. What is a brute force attack, and how does it work? A brute force attack is a systematic trial-and-error approach employed by attackers to guess login credentials, such as usernames and passwords. Attackers aim to gain unauthorized access to a system or account by systematically attempting every possible combination of cha...