Blog (976)

Case Overview:   Download the PDF

This case, adjudicated under the Information Technology Act, 2000, involves a significant breach of cybersecurity and financial fraud. The Complainant, Dhule Vikas Sahakari Bank Ltd. (DVSB), a cooperative bank, alleg

Read more…

In today’s fast-paced healthcare environment, efficiency, accuracy, and speed are more important than ever. One critical area where many healthcare providers face bottlenecks is the prior authorization process. Prior authorization, or prior auth, is

Read more…

We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman)) and Erik Laird (Vic

Read more…

We had a community fireside chat on "The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem" with Matthew Maynard (Security Operations Specialist, BJC Healthcare) & Erik Laird (Vice President - North America, FireCompass), where we delv

Read more…

Modern cyber defenses increasingly need to be identity-centric. Many industry thought leaders have honed in on this giving rise to the often heard “identity is the new perimeter”. Consequently, attackers do indeed now find it easier to log in rather

Read more…

The power of signals, or indicators, is evident to those who understand them. They are the basis for identity risk intelligence and it’s role in disinformation security. For years, cybersecurity teams have anchored their defenses on Indicators of Com

Read more…

We’re excited to bring you an insightful fireside chat on "The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem" with Matthew Maynard (Security Operation Specialist, BJC Healthcare | Incident Response Analyst | Ethical Hacker | Dark W

Read more…
In an era marked by evolving cyber threats and increasing complexity, organizations are turning to Artificial Intelligence (AI) to bolster their cybersecurity strategies. This blog explores a few key use cases of AI in cybersecurity, highlighting how
Read more…
RSS
Email me when there are new items in this category –

Join The Community Discussion