There is mystery and fear around the esoteric side of the internet - the Dark We...
A new phishing technique - "Browser in the Browser (BitB)" attack is in the lime...
Threat Modelling is a necessary and important step in Software Development. This...
Information security training is a vital part of an ISMS. In this blog, find out...
Risk assessment is the backbone of information security. In this blog Understand...
All about Phishing Simulation and how it can help you!!
This is the story of 'SPRINTY', our homegrown software that helped us cut downti...
The number of internet users has grown exponentially, and so have cybercrimes. T...
The inside story of how Risk Quotient moved from a traditional Gantt chart based...
Risk Quotient and FIGmd - contributing towards a more secure healthcare IT opera...
The goal of a CCMP is ultimately reducing risks and thereby reducing the impact ...
Here's a few changes your BCP needs- explained by our Business Continuity Expert...
We are conducting a Cyber Crisis Management Plan Training on 23 May. Click to kn...
With almost the entire world under lockdown, Deepanjali Kunthe (Vice President, ...
It is the need of the hour for all organizations to engage in a comprehensive an...