Defense in Depth Security: Stopping the Advanced Cyber Attacks in its Track Over the past few decades, the digital world has revolutionized itself manifold. Organizations no longer assume that trusted objects only exist inside, and untrusted ones
An Ideal Virtual Airgap Solution for Enterprises of Tomorrow A virtual airgap is a security measure that is used to isolate a computer or network from external access. This is usually done by disconnecting
Making Internet Browsing 100% Safe As the internet becomes integral to everything we do, the need to ensure an adequate level of security for all transactions and operations conducted online
Accops Finishes 2022 On A High Note, Wins Four Prestigious Awards The year 2022 marked a significant landmark for Accops as we completed a decade of our existence. When we look back on where we started
Fend-off ransomware with Accops zero trust protection In recent years, we are witnessing an exponential rise in ransomware attacks globally. As ransomware attacks continue to rise, the online security of organizations is
Digital Workspace vs Digital Workplace: How are they different? Most people use the terms ‘Digital Workspace’ and ‘Digital Workplace’ interchangeably and believe they both have similar connotations. This is a common misconception as these
Why Cybersecurity Is More Than Just An ‘IT Issue’ What comes to mind when you think about cybersecurity? For many, the first thing that comes to mind is the IT department. While cybersecurity challenges
Polkit's pkexec (PwnKit) Local Privilege Escalation Vulnerability - CVE-2021-4034 On Jan 25th 2022, a critical vulnerability aliased “PwnKit” or CVE-2021-4034 was publicly released. Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in
Why ‘identity-first’ is the new mantra to ensure security across hybrid workspace? Credential theft has witnessed a meteoric rise in the past couple of years with the surge in remote work. Reports suggest over 4/5th of
A Comparison of The 5 Most Common Biometric Techniques The most well-known kinds of biometric security are fingerprint recognition and iris scanning. However, face recognition and vein pattern recognition (on the finger and palm)
How can BFSI businesses leverage hybrid IT infra to accelerate business growth? The BFSI ecosystem has been evolving rapidly – customer expectations are reaching newer heights; fintech companies are challenging conventional financial businesses with their innovations; and commercial
Apache Log4j2 (Log4Shell) RCE Vulnerability - CVE-2021-44228 On Dec 9th, a zero-day exploit in an open-source library named “Log4j” was made public. This library is very popular for creating logs by Java
Be future-ready with an agile & compliant Digital Workspace The digital transformation journey picked up pace during the pandemic with many organizations, not all by choice, accelerating their remote work adoption. Shifting from a