Image 1
The Good \'Bad Guys\' - What is Red Team Assessment?
  Red Teaming     

October 30, 2018

With advancing cybercrimes techniques improving your defences for data protection is naturally the most crucial need of the hour.    Read More...

Image 1
GDPR Compliance using RSA Archer
  GDPR        Data Protection        Security     

May 30, 2018

The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation in EU law on data protection and privacy for all individuals within the European Union.    Read More...

Image 1
One minute guide to GDPR Compliance (Infographic)
  GDPR        Compliance        Data Security     

May 23, 2018

We are a few days away from the implementation of Europe\'s new privacy rule that is reshaping the internet. The General Data Protection Regulation (GDPR) is said to be the most important change in data privacy regulation in the past 20 years. The GDPR Compliance infographic will help answer some of the relevant and important questions around the regulation.    Read More...

Image 1
Understanding DDoS attack and how to prevent them - Infographics
  DDoS Attack        Security     

February 20, 2018

Learn more about Distributed Denial of Service (DDoS) attack, how they work and how to stop DDoS attacks and steps to prevent DDoS attacks in the future    Read More...

Image 1
Part 1 : Governance Risk and Compliance
  GRC security     

February 19, 2018

The world as we know it is turning into an age of information. Information is flowing around everywhere by establishing deep roots and being more valuable. Organizations are facing issues in handling the flow of information.    Read More...

Image 1
War !!!!
  cybersecurity        Cyberwarfar     

February 12, 2018

The world is moving into an age where information is costlier than fuel. Information is considered as the new driving factor of a whole new era to come.    Read More...

Image 1
Breaking down an Incident Chain
  Incident Chain     

November 23, 2017

Organizations are like trees, they grow and spread their branches wide. When an incident happens in a tree-like IBM, Microsoft, Google or any other giants, it becomes tough to manage those incidents.    Read More...

Image 1
How Do You Securely Conduct Online Transactions
  security payment     

November 16, 2017

When you start working for a security company, it\'s easy to get so afraid of doing anything online for fear of being watched, robbed and what not, that for the first few months you simply stop doing any online transaction, stare obsessively at your webcam wondering if it\'s been hacked and look for that green lock on all the websites you visit. As you may have already guessed, this was me until a few weeks ago.    Read More...

Image 1
Behind the job title: Information Security Consultant
  Information Security     

November 13, 2017

We all know who a doctor is! When we have a fever, headache or any other illness we rush towards the clinic and ask for medicines for a cure. Here\'s a classic example. You wake up one mo ing with a sore throat. The kind that makes you sound like a frog and feel much worse. You rush to the clinic, explain the scenario, and discuss the symptoms and any relevant past medical history with the doctor.    Read More...

Image 1
Congratulation Sunil! Paramount is proud to have you as our Alumnus!

November 9, 2017

There are a few people you meet in life, who stand out from the proverbial crowd, and exhibit small sparks right from the first encounter which you know will grow into bright flames. When we were working with Sunil Varkey, in the dawn of Internet Security, we too had several glimpses of the tremendous trajectory his future career would take.    Read More...

Image 1
The Mac Vs PC Security Debate

October 13, 2017

The PC Vs Mac battle has been going on for years, with a staunch section of Mac users screaming from the rooftops about how awesome their machine is and an equally vociferous PC brigade decreeing that Macs are not for the true blue techies who love tinkering with everything. But for the longest time, Macs have been considered invulnerable to attacks, especially by simpletons like me.    Read More...

Image 1
Is Cybersecurity Just about Securing the Gadgets?
  Cybersecurity Tailgating     

October 11, 2017

From the very linguistics of the word Cybersecurity, there is a certain involvement of the digital component. When we imagine cybersecurity, we are often thinking of hackers in hoodies, or the important cyber cell guy from law enforcement who is trying to fix a crisis.    Read More...

Image 1
Do we really need to be taping our webcams?
  webcam        cybersecurity     

July 20, 2017

There was quite the stir sometime back when the tech paparazzi got hold of pictures of Mark Zuckerberg's taped laptop. Ever since the photo went viral, there have been rumours about how our private lives are doing the rounds on the dark web. While there may be quite the market for Zuckerberg's life and it's easily conceivable that people will pay good money for a peak of how Leonardi Di Caprio looks like while tapping away at his laptop, is there really any threat to mere mortals like you and    Read More...

Image 1
What goes into a COBIT 5.0 Assessment?

July 18, 2017

In order to find a single assessment framework to tie up ISO 27001:2013, ISO 20000-1:2011, ISO 22301:2012 and ISO 31000 requirements, I was searching for a comprehensive IT governance methodology. That is when I took interest in CO-BIT (Control Objectives for Information and related Technology). After completing a COBIT Foundation and COBIT Assessor course, I understood that this framework can become a strong factor in enabling entities in achieving its primary goals for IT governance. This fram    Read More...

Image 1
Paramount Presents CyberSecurity For Beginners: Identity and Access Management
  Identity and Access Management     

July 12, 2017

Hello guys and welcome to the second episode of the Paramount presents Cybersecurity for beginners. First of all, thanks guys for your great response to our first episode. After the discussion on careers, I figured it would be great if we could shine some light on an often misunderstood area of cybersecurity, Identity and Access Management. When I asked some people out there, what they thought about Identity and Access Management, I got quite a wide variety of answers. Some thought it was to do    Read More...