Paramount Podcast: Episode 2: Identity and Access Management
Hello guys and welcome to the second episode of the Paramount presents Cybersecurity for beginners. First of all, thanks guys for your great response to our first episode. After the discussion on careers, I figured it would be great if we could shine some light on an often misunderstood area of cybersecurity, Identity and Access Management. When I asked some people out there, what they thought about Identity and Access Management, I got quite a wide variety of answers. Some thought it was to do with identity theft, others thought it’s a means to keep track of employees and so on.
What goes into a COBIT 5.0 Assessment?
In order to find a single assessment framework to tie up ISO 27001:2013, ISO 20000-1:2011, ISO 22301:2012 and ISO 31000 requirements, I was searching for a comprehensive IT governance methodology. That is when I took interest in CO-BIT (Control Objectives for Information and related Technology). After completing a COBIT Foundation and COBIT Assessor course, I understood that this framework can become a strong factor in enabling entities in achieving its primary goals for IT governance. This framework will also enable transformation of organizational practices and create improved processes.
Do we really need to be taping our webcams?
There was quite the stir sometime back when the tech paparazzi got hold of pictures of Mark Zuckerberg's taped laptop. Ever since the photo went viral, there have been rumours about how our private lives are doing the rounds on the dark web. While there may be quite the market for Zuckerberg's life and it's easily conceivable that people will pay good money for a peak of how Leonardi Di Caprio looks like while tapping away at his laptop, is there really any threat to mere mortals like you and me.
Demystifying Governance Risk and Compliance (GRC)
In a company, there are generally a few people, who are often the leaders of the organisations, who look after the way in which a company is run. They are entrusted the task of running the company in an ethical way, making sure that the company establishes appropriate objectives and shows measured achievements toward those objectives. This is Governance.
The SME Cybersecurity Budget: Why should you have one?
Most people have heard this adage: Penny Wise and Pound Foolish. My father constantly tells this to my mother, especially when she penny pinches on our luggage. This one time, when we were travelling, Ma had picked up a cheap, knockoff suitcase from some shady store in the mall. We packed up and left for a highly anticipated holiday and after the 16 hour flight, when we were waiting for our luggage, Ma's newly purchased 'Samsonaite' suitcase was struggling to stay closed, with the zipper having given out at many locations. We had to scoop up everything from 'unmentionables' to gifts for family friends, and shove it into hastily purchased, exorbitantly priced bags from the airport. Some of Ma's prized possessions were lost forever and our dream holiday started off on a less than pleasant note.
22 Months in... My views of the cybersecurity Industry
Nope, this article is not about passion/purpose, but about how I stumbled into the cybersecurity field and discovered my passion, which has incidentally given my life a purpose. As a normal girl who completed her bachelor’s in Information technology, and was still contemplating about the next big step, I had no idea that an industry which I looked upon with fascination would become the most pivotal point of my professional life. Wondering what I’m talking about? Here’s what I was thinking two years ago, when I started my career.
Paramount Podcast: Episode 1: Careers in Cybersecurity
Welcome listeners to the very first podcast of Paramount Presents Cybersecurity for Beginners! I’m Remya Menon, the Digital Marketing Consultant at Paramount and also your host for these podcasts. For those of you who are familiar with Paramount, what I’m going to say now may seem like a story you have heard before, but for the sake of our new followers and listeners, here’s a little tidbit about us. We are the regional leaders in information security and we work with a whole gamut of industries, from hotels to Technology companies and even the banking sector. So since we have been around in the industry now for 25 years, we decided that the best way to celebrate this silver jubilee would be to get talking with everyone out there who is curious about cybersecurity, what it means for individuals and companies and why we should all really care about this.
How Enterprises in the UAE Should Prepare for the Ransomware Onslaught in 2017?
Pundits are calling it the rise and rise of ransomware. Ever since cyber criminals saw the potential of having individuals and enterprises at their mercy by gaining access to personal and professional information, cybersecurity experts are facing one of the biggest challenges in the last few years. In 2016, the number of attacks grew five fold and warnings were issued from government officials in many countries including the UAE.
What will be the biggest cybersecurity threats in 2017
If 2016 was the curtain raiser for cybercrime, 2017 is predicted to be the year hackers are going to put up their magnum opus performance.While we are by no means glamourising the cyber crime that is rampant today, the reality is that data theft and information security risks are now being packaged with extremely creativity. Almost a billion compromised accounts on Yahoo, state sponsored cyber strong arming of the US elections; 2016 unveiled the dark realities of cyber crime to a hitherto happily ignorant world.
Top 5 Cybersecurity Predictions for 2016
Ransomware led Cyber Extortion will see significant surge: Encryption which was hitherto the tool of information protectors will be effectively used by the attackers in making money. Cryptowall hacking group making USD 325 million would motivate other cyber adversaries to join the group. Without any significant countermeasure to offset this, organizations needs to focus on employee awareness on phishing and backing up of data on a daily basis.