cyber Adventura

cybersecurity


cyber

  • Movies as a metaphor to grasp cybersecurity principles

    The foundation principles of cybersecurity are core concepts and practices that help protect computer systems, networks, and data from various threats and vulnerabilities. These principles serve as a framework for building a robust cybersecurity posture.Relatability often helps us to reinforce our understanding and strengthen our knowledge in the domain. So I thought of adding some Continue reading

  • Information technology ! A funny redux

    In our earlier blogs, we have been talking about cybersecurity or information security , but it just can’t be contextualised if one doesn’t understand the overarching concept. Thats where IT or Information Technology or OT or Operational Technology comes in. In our previous blog we have already explained what OT is. Now let’s explain IT. Continue reading

  • The story of vulnerabilities

    Imagine you’re at a buffet, surrounded by all kinds of delicious food. You’re famished, and the sight of healthy and tasty food can’t hold you back. But suddenly, a tiny fly appears out of nowhere and starts buzzing around your plate. You try to swat it away, but it’s persistent and keeps bothering you. That Continue reading

  • TTP . Tactics, Techniques and Procedures

    In our earlier blogs, we spoke about threat actors and their motivation, the attack surfaces they will use to mount an attack. But how will they gain an entry and what will they gain and/or achieve ? And most importantly how will the good guys (read Cybersecurity professionals) figure out the modus operandi and stop Continue reading

  • Constructing a Cybersecurity Threat landscape

    A cybersecurity threat landscape refers to the overall view of potential threats and risks that an organisation might face from cybersecurity. It includes a comprehensive analysis of various types of threats, their potential impacts, and the likelihood of their occurrence. The goal of assessing the threat landscape is to develop effective strategies to manage and Continue reading

  • Understanding Attack Surfaces

    Every now and then we encounter news that there has been cyberattacks on an organisation, some websites have been defaced, or there has been a data breach. Such news do make us wonder how that happened in the first place !! How did they break into the organisation , what were the points of entry Continue reading

  • Cybersecurity is multidisciplinary and constantly evolving

    Last summer I bumped into an old friend from school. An accomplished law graduate from one of the Ivy League Universities , he was working on a task force from a Government organisation regulating cybersecurity. I was a bit baffled and asked him if his non technical background could be limiting factor in understanding the Continue reading

  • Who are the culprits behind cyberattacks/cybercrime ?

    Today, we have just received the news that a number of European banks have been subjected to cyberattacks ! Immediately a question crosses our mind !! Who is behind those attacks ?? The news outlets call them as hackers, hactivists etc, but they have formal name , ‘Threat actors‘ !! Threat Actors can be loosely Continue reading

  • Global cooperation for cybersecurity

    Cybersecurity nowadays, is a global concern, as cyber threats and attacks transcend geographical boundaries and affect organisations and individuals worldwide. It is a well known fact that some nation states employ hackers or sponsor cyber operations to achieve political, economic, or military objectives. These nation state-sponsored hacking activities are often referred to as “cyber espionage” Continue reading

  • The case of Operational Technology

    Did you watch Charlie Chaplin’s immortal ‘Modern Times’ ? Where the protagonist is labouring furiously on the assembly line ! The automated assembly line is all about OT or Operational Technology. All of us have experienced OT in our lifetime, in some form or the other , in most aspects of our lives, but we Continue reading