Image 1
The Mac Vs PC Security Debate
  Security     

October 13, 2017

The PC Vs Mac battle has been going on for years, with a staunch section of Mac users screaming from the rooftops about how awesome their machine is and an equally vociferous PC brigade decreeing that Macs are not for the true blue techies who love tinkering with everything. But for the longest time, Macs have been considered invulnerable to attacks, especially by simpletons like me.    Read More...

Image 1
Is Cybersecurity Just about Securing the Gadgets?
  Cybersecurity Tailgating     

October 11, 2017

From the very linguistics of the word Cybersecurity, there is a certain involvement of the digital component. When we imagine cybersecurity, we are often thinking of hackers in hoodies, or the important cyber cell guy from law enforcement who is trying to fix a crisis.    Read More...

Image 1
The Mac Vs PC Security Debate
  Security     

October 9, 2017

The PC Vs Mac battle has been going on for years, with a staunch section of Mac users screaming from the rooftops about how awesome their machine is and an equally vociferous PC brigade decreeing that Macs are not for the true blue techies who love tinkering with everything. But for the longest time, Macs have been considered invulnerable to attacks, especially by simpletons like me.    Read More...

Image 1
Do we really need to be taping our webcams?
  webcam        cybersecurity     

July 20, 2017

There was quite the stir sometime back when the tech paparazzi got hold of pictures of Mark Zuckerberg's taped laptop. Ever since the photo went viral, there have been rumours about how our private lives are doing the rounds on the dark web. While there may be quite the market for Zuckerberg's life and it's easily conceivable that people will pay good money for a peak of how Leonardi Di Caprio looks like while tapping away at his laptop, is there really any threat to mere mortals like you and    Read More...

Image 1
What goes into a COBIT 5.0 Assessment?
  COBIT     

July 18, 2017

In order to find a single assessment framework to tie up ISO 27001:2013, ISO 20000-1:2011, ISO 22301:2012 and ISO 31000 requirements, I was searching for a comprehensive IT governance methodology. That is when I took interest in CO-BIT (Control Objectives for Information and related Technology). After completing a COBIT Foundation and COBIT Assessor course, I understood that this framework can become a strong factor in enabling entities in achieving its primary goals for IT governance. This fram    Read More...

Image 1
Paramount Presents CyberSecurity For Beginners: Identity and Access Management
  Identity and Access Management     

July 12, 2017

Hello guys and welcome to the second episode of the Paramount presents Cybersecurity for beginners. First of all, thanks guys for your great response to our first episode. After the discussion on careers, I figured it would be great if we could shine some light on an often misunderstood area of cybersecurity, Identity and Access Management. When I asked some people out there, what they thought about Identity and Access Management, I got quite a wide variety of answers. Some thought it was to do    Read More...