Author: Nikhil

What is the similarity between Generative AI and the Marvel Comics supervillain Thanos? Both are inevitable. Generative AI is being increasingly used everywhere. The problem is that everything is fine when the AI is generating content based on the employees’ ideas, but what happens when it starts generating content based on the employee data? That too without the management’s knowledge? Shadow AI’s growing shadow Welcome to shadow AI. It works on the same principle as shadow IT and is even more dangerous. We already know the effects of AI on decision-making and cognition. As per IBM, from 2023 to 2024,…

Read More

As the app economy continues to grow, it continues to attract increased attention from bad actors. The increased focus means the app is unsafe right from its development, right up to its eventual retirement. The various types of threats include tampering, reverse engineering, and a variety of runtime threats. App integrity is becoming increasingly important as the rising app economy and technologies mean apps now handle and access a lot of sensitive data like personal identifiable information (PII) and financial information, which means apart from protecting from threats, the software should also help comply with stricter norms about critical factors…

Read More

US President Donald Trump created (some more) controversy recently by posting an AI video that ends with his predecessor Barack Obama being jailed. Leaving the politics aside, the most disturbing part is the disturbing lifelike quality of the “arrest” sequence. This kind of trouble was expected with this video showcasing Google AI video’s capabilities. Pair this with the ever-evolving deepfake videos and images, and you can understand why the CISOs are getting increasingly stressed and the SecOps looking increasingly like zombies as the weekend nears. It is time to add N to WYSIWYG. What You See isn’t Necessarily What You…

Read More

Threat intelligence is a vital part of organizational security. It allows organizations to move from reactive to predictive cybersecurity. In simpler terms, while reactive cybersecurity investigates the reasons why the barn door was not bolted, which allowed the horse to escape the barn, a predictive or proactive approach warns that the door may be open or can be opened quickly. This allows the owners to check the barn door and ensure that the horse doesn’t exit the barn. Why compare? Now that we have established the importance of the Digital Threat Intelligence Management (DTIM) technology, let us further drill down…

Read More

Microsegmentation is a critical component of any organization’s Security Operations (SecOps) policies. It puts up barriers to ensure an intruder cannot proceed further. The methodology can be observed in advisory models. Most advisory models are detached from operational realities. They offer broad assessments without regard for region-specific needs, industry constraints, or the actual experience of users. Speaking strictly from the perspective of barriers limiting movement, we can state that this misalignment effectively ends up trapping businesses in information silos. The result? Companies end up choosing platforms that don’t fit their required use cases. Rollouts stall. Adoption suffers. And promising vendors…

Read More

Bots are all around us. These little pieces of software mimic human behavior and guide us through various processes, like customer service. They are everywhere; in fact, they reportedly comprise about 50 per cent of the internet traffic. The sheer numbers, coupled with their ability to be good or bad, make deploying bot management software a critical part of improving users’ security posture. Let us take a deep dive and see what trends are driving the market for bot management software. Final take: Lokesh Biswal, security analyst at QKS Group, elaborates “The combination of zero trust and edge computing is…

Read More

To paraphrase Benjamin Franklin’s famous quote, “In this world, nothing is certain except death, taxes, and software vulnerabilities.” One hundred per cent bug and vulnerabilities-free code is yet to be written. Thus, vulnerability detection and management remain a perpetual headache for vendors and users. The old method scans for vulnerabilities and offers risk ratings (sometimes out of context) by vendors. The vulnerabilities are patched based on this score. Obviously, this method has several drawbacks, starting with SOCs getting fatigued by the process. The vendor scores would not have the same context for all vendors, which could result in critical flaws…

Read More

Most of us will have spotted the pun in the heading from a mile away, but that is what headings are for. Their intent is to arouse curiosity about the content. If you have come this far, it means we have succeeded in drawing your attention. So, without much ado, let us talk about the topic: A comparison of 2024 and 2025 SPARK matrices for the Security Orchestration and Response (SOAR) market. SOAR tools are becoming necessary as they help SOCs detect, investigate, and respond to threats faster. It achieves this objective by automating repetitive tasks and orchestrating (executing multiple…

Read More

If one wants to know about how severe DDoS attacks have been, here are some numbers from Cloudflare: In the first quarter of 2025, the company blocked 20.5 million DDoS attacks. As per the company, it is a 358% year-over-year (YoY) increase and a 198% quarter-over-quarter (QoQ) increase. And these numbers are from just one (albeit a very big) company. And it is not just the numbers, the size and sophistication of attacks have been on the rise. Cloudflare itself saw off an attack measuring an astounding 7.3 terabits per second in January 2025. Not only the attack sizes, but…

Read More

Even as healthcare becomes increasingly digitalized owing to various benefits such as enhanced patient monitoring, it has opened up new attack surfaces. These threats are much more terrifying. Financial and brand image losses can be recovered, but attacks on healthcare facilities can be fatal. There is no recovery after death. This disadvantage makes securing these systems against various threats like ransomware a must-do strategy. This analysis includes major vendors and their rankings as per customer impact and technology excellence. These rankings can be a vital asset while choosing a product that is the best fit for your establishment. Let us…

Read More