Author Archive Subham Paul

BySubham Paul

CF BYTES – Issue #6

Almost every security agency today is alarmed due to cyberattacks, as data breaches and fraudulent activities surge amidst the deadly pandemic that is rocking the world. From government agencies to healthcare and educational institutions, from fintech firms to cyber insurance companies, numerous entities have been targeted by bad actors. At the same time, there have been positive developments in the field of cybersecurity that promise to build safer cyberspace for mankind. This issue of CF Bytes shall highlight some of the biggest cyberattacks and cybersecurity developments that took place in the last fortnight.

Read More
BySubham Paul

The Way Forward: 15 AI-ML Trends for 2020

Paying at shops? Listening to music? Booking a cab? Tracking a courier package? Look around yourself and almost everything is handled digitally. Technology is the virtual life support system of mankind because our ways of living have got extremely fast and easier with its perusal along with Artificial Intelligence and Machine Learning. This calls for a constant inspection of areas to improve, which brings you to read this article on 15 AI-ML trends to watch out in 2020.

Read More
BySubham Paul

Enriching thoughts unfolded at the panel discussion on ‘Cybersecurity enabling businesses in COVID-19 situation’

In light of the pandemic that has taken the entire world by storm, starting with China and then the European Union turning out to be the new epicenter, businesses have suffered big blows. The negative disruption brought forth by the global outbreak of the COVID-19 virus (or popularly known as the novel Coronavirus) has led to most organizations enabling their employees to work from home to ensure the continuity of their business. However, this brings with itself several implications from the cybersecurity perspective, along with people management issues in general. To throw some light on these issues, top security and risk management leaders took part in an intriguing virtual panel discussion on the topic ‘Cybersecurity enabling businesses in COVID-19 situation’ on 21st March 2020, hosted by CyberFrat – an enterprise risk management community.

Read More
BySubham Paul

Behavioral Analytics – the trusted watchdog in Cybersecurity

Modern-day business security leaders openly talk about maintaining intrinsic data on how users and systems behave. What do they do with this? When exactly do they need this? Who helps them in using this? Does it ease the pain of boosting the overall enterprise security and answering stakeholders? All of these shall be answered in this piece on Behavioral Analytics, one of the go-to methods for modern cybersecurity professionals to nip suspicious activities in the bud.

Read More
BySubham Paul

CF BYTES – Issue #5

The novel Coronavirus outbreak has brought forth one of the biggest negative disruptions across the globe, adversely affecting organizations and humanity in general. There have been multiple small-scale cybersecurity incidents revolving round the pandemic, apart from the big events that continue to rattle us all. Focusing on the need to make our readers aware about the same, this issue of CF Bytes shall focus on some of the most impactful cyberattacks and developments in the field of cybersecurity that took place in the last two weeks.

Read More
BySubham Paul

Combating Breach Fatigue – time for a wake up call!

What crosses your mind when you hear the word fatigue? Does it remind you of the times when you return home tired after an intense workout session, or of tiredness in general? In either case, it signifies the intent to give up the intent to rectify something amiss. To the dismay of most CISOs today, such a thing has crept up the minds of employees for whom cyberattacks, especially data breaches, are just part of everyday life now. This article deals with this phenomenon, technically termed ‘Breach Fatigue‘ and some subtle ways of combating it.

Read More
BySubham Paul

CF BYTES – Issue #4

If you heard that cyberattacks spare none, you’ve heard right. The globe is on fire following the spree of cyberattacks that have skyrocketed in a short span of time. Instances of attacks on individuals to nations (including a renowned football club!) have rattled the cybersecurity scenario, prompting researchers and organizations to up the ante against malpractices and develop products and strategies to combat them. Here, we present to you the latest issue of CF Bytes which talks about the major global cybersecurity developments and cyberattacks in the last fortnight.

Read More
BySubham Paul

The magic of Continuous Intelligence – doing smart business on the go

How would a human body survive without a nervous system that constantly responds to external and internal stimuli?

How could a traffic controller perform without constantly sensing the traffic situation and reacting accordingly?

How on Earth could a candidate pass a modern job interview without knowing current affairs?

Advocates of modernization love to associate the word ‘data’ with every business problem. It is indeed true that data-driven decisions are the most practical and helpful decisions to prevent the boat from sinking. However, the pool of data is too huge to be managed by traditional analytical systems such as Big Data and Business Intelligence. Just like the human body, the traffic controller and the interview candidate, modern businesses also require a thorough (yet quick) analysis of real-time data that, when augmented with analyzing historical data, can provide the most rewarding solutions for the enterprise and make it sustainable in the long run. We are talking about the trend of Continuous Intelligence (or CI), and here we shall see what it can bring to the table in the context of business problem-solving.

Read More
BySubham Paul

The Perils of Swarm Technology – Are you ready for a Swarm Attack?

Have you ever imagined your organization’s network getting infiltrated by a bot swarm that eventually steals data and leaves you spellbound? If you haven’t, it is time to beware of such a possibility. Advances in Artificial Intelligence have made intelligence sharing and correlation a possible approach for specialized bots to interact amongst themselves in real-time and improvise an attack in perfect synchronization. We have entered the age of swarm technology and it is only apt to brace ourselves for an impending attack from the new miscreants.

Read More
BySubham Paul

CF BYTES – Issue #3

It is just the second month of the new year and we have already been fed with a huge array of developments in the cybersecurity industry. At the same time, the incidents of cyberattacks have been on the rise, continuing to affect organizations and society at large. With this, CF Bytes is back with the latest issue about the major global cybersecurity developments and cyberattacks in the last fortnight.

Read More
Social media & sharing icons powered by UltimatelySocial