Dive into the fascinating world of Risk Reporting and Biases. This blog unravels...
In this blog, get an understanding of the importance of conducting "Security Rev...
Data protection and Data Privacy are in the limelight again after India passed a...
After the pandemic, companies have adapted to work from home/hybrid mode of work...
Business is not done in a vacuum. There is high dependency on external parties. ...
There is mystery and fear around the esoteric side of the internet - the Dark We...
A new phishing technique - "Browser in the Browser (BitB)" attack is in the lime...
Threat Modelling is a necessary and important step in Software Development. This...
Information security training is a vital part of an ISMS. In this blog, find out...
Risk assessment is the backbone of information security. In this blog Understand...
All about Phishing Simulation and how it can help you!!
This is the story of 'SPRINTY', our homegrown software that helped us cut downti...
The number of internet users has grown exponentially, and so have cybercrimes. T...
The inside story of how Risk Quotient moved from a traditional Gantt chart based...
The goal of a CCMP is ultimately reducing risks and thereby reducing the impact ...