Rising Cyber Threats

Rising Cyber Threats – Are You Prepared?

The cyber world is changing leading to an effective change in the internet too. The internet is continuously creating huge interconnecting contacts resulting in massive business prospects. The increasing exchange of volume of data, personal and corporate, is creating a pool for cyber criminals and state-sponsored espionage. The higher the connectivity, the greater risk of…

EC-Council University and the Institute of Technology and Science Join Forces to Create Skilled Cybersecurity Professionals in India

New Delhi, India – 16th March 2019: The Institute of Technology and Science (ITS) announced a partnership with EC-Council University (ECCU) to promote cyber security skill development for its students. With this partnership, ITS students can now gain access to the cybersecurity curriculum of EC-Council University, which is recognized globally. According to IBM, India’s current…

Social engineering

The Art of Manipulation – An Introduction to Social Engineering and Its Different Types (Part 1)

What is Social Engineering? Social engineering is the art of manipulating to attain confidential information. This is a sophisticated attack by hackers, aimed to use your empathy and sympathy to gain trust and ultimately gain undue access to the system. The information that these criminals are seeking differs from your official system or email password…

Information Security Officer

6 Key Characteristics of a Successful CISO

Organizations need a multi-faceted strategy to identify, address and combat cyberattacks. Information security infrastructure, cybersecurity skills, a well-drafted assessment methodology, etc. forms the basis of cybersecurity strategy. To pull this all together and use them effectively, an organization also needs a Chief Information Security Officer (CISO) who possesses strong leadership skills. The CISO is an…