Image 1
Breaking down an Incident Chain
  Incident Chain     

November 23, 2017

Organizations are like trees, they grow and spread their branches wide. When an incident happens in a tree-like IBM, Microsoft, Google or any other giants, it becomes tough to manage those incidents. The most effective manner for incident management is to identify the cause of an incident and try to mitigate it. But nowadays risks can be interconnected and tough to identify. While Identifying the cause by Root cause analysis, we often fail to find the interconnected risk and the process becomes    Read More...

Image 1
How Do You Securely Conduct Online Transactions
  security payment     

November 16, 2017

When you start working for a security company, it\'s easy to get so afraid of doing anything online for fear of being watched, robbed and what not, that for the first few months you simply stop doing any online transaction, stare obsessively at your webcam wondering if it\'s been hacked and look for that green lock on all the websites you visit. As you may have already guessed, this was me until a few weeks ago.    Read More...

Image 1
Behind the job title: Information Security Consultant
  Information Security     

November 13, 2017

We all know who a doctor is! When we have a fever, headache or any other illness we rush towards the clinic and ask for medicines for a cure. Here\'s a classic example. You wake up one mo ing with a sore throat. The kind that makes you sound like a frog and feel much worse. You rush to the clinic, explain the scenario, and discuss the symptoms and any relevant past medical history with the doctor.    Read More...

Image 1
Congratulation Sunil! Paramount is proud to have you as our Alumnus!

November 9, 2017

There are a few people you meet in life, who stand out from the proverbial crowd, and exhibit small sparks right from the first encounter which you know will grow into bright flames. When we were working with Sunil Varkey, in the dawn of Internet Security, we too had several glimpses of the tremendous trajectory his future career would take.    Read More...

Image 1
The Mac Vs PC Security Debate

October 13, 2017

The PC Vs Mac battle has been going on for years, with a staunch section of Mac users screaming from the rooftops about how awesome their machine is and an equally vociferous PC brigade decreeing that Macs are not for the true blue techies who love tinkering with everything. But for the longest time, Macs have been considered invulnerable to attacks, especially by simpletons like me.    Read More...

Image 1
Is Cybersecurity Just about Securing the Gadgets?
  Cybersecurity Tailgating     

October 11, 2017

From the very linguistics of the word Cybersecurity, there is a certain involvement of the digital component. When we imagine cybersecurity, we are often thinking of hackers in hoodies, or the important cyber cell guy from law enforcement who is trying to fix a crisis.    Read More...