Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

How secure is your UPSI as SEBI tightens its reins on Insider Trading?

In September 2021, the Indian Markets Regulator, Security, and Exchanges Board of India (SEBI) banned an employee of an Indian MNC headquartered in Bangalore and his counterpart, an employee of a leading Global information technology company from trading in stock exchanges till further orders. An impounding of illegal proceeds of 2.62 crore rupees were generated through insider trading activities. This is just an example of insider trading.

How to Address Cultural Change When Implementing a Cybersecurity Program

Cybersecurity is more important than ever before, with the number of corporate breaches increasing dramatically since 2020. In response to recent spikes in threats, many companies are working to create a more cybersecurity-focused employee base. The most effective way to do this is through a top-down, widespread shift in company culture, which places security among the top values.

Will China's Personal Information Protection Law be a game-changer for data security?

20th August 2021, dawned a new era for China’s cybersecurity with the passing of China’s Personal Information Protection Law (PIPL) which is the first comprehensive legal attempt to define personal information and regulate its storing, transferring, and processing.

LOG4J security vulnerability (Log4Shell)

On Nov. 24th 2021 a severe security vulnerability, called “Log4Shell”, has been reported in the JAVA framework “Log4J” 2.x which is widely used for event logging in JAVA applications worldwide. The vulnerability allows cyber-attackers to execute arbitrary code by injecting it into a logging process implemented in Log4J. The “Log4Shell” vulnerability allows complete server takeover by the attackers.

The Top Cybersecurity Trends to Watch in 2022

Right now, cybersecurity is more important than ever. Major changes to how we work and live — like the pivot to remote work or the growing use of IoT (internet of things) devices — have created new cybersecurity vulnerabilities and challenges. Businesses will need new strategies to respond to the changing cybersecurity threat landscape. These cybersecurity trends are likely to show where the field is moving in 2022 and how businesses should prepare.

SECUDE Celebrates 25 Years of Innovation and Delivery of Excellence to its Customers

LUCERNE, DECEMBER 2021: SECUDE, a leading Digital Rights Management (DRM) solutions provider, and Microsoft Partner, is celebrating the 25th year of innovation and delivery of excellence to its customers. SECUDE is looking back proudly at the many milestones in its history of shaping the data security industry.

How SECUDE HALOCORE helps Infosys extend data protection outside the organization

Infosys is a global leader in next-generation digital services and consulting. It enables clients in 46 countries to navigate their digital transformation. With $13 Billion USD as its last 12 month’s revenue, serving a client base of 1500 customers, human capital of 249K employees, and managing millions of square feet of real estate.

CISA Releases New Tool to Help Organizations Prevent Insider Threats

Organizations across various industries spend their time and resources to mitigate impending cybersecurity threats to protect their assets and sensitive data. As new technologies come into play, more comprehensive cybersecurity measures are needed to protect these organizations. We’re in a time when remote work has become the norm, thus making cybersecurity that much more of a priority for many organizations.

Why you need a layered security approach for protecting your data in today's threat landscape

Data is the lifeblood of any organization, and thanks to digital transformation, data can be shared easily among many users within and across organizations. Organizations store as well as transmit large amounts of sensitive data and information. As more and more data exchange happens, risks and threats also increase. The average cost of a data breach was $ 3.86 million and surprisingly the average time to identify and contain a breach was a staggering 280 days.

SECUDE and Turnkey Announce Strategic Technology Partnership

LUCERNE, NOVEMBER 2021: SECUDE, an established global security solutions provider offering innovative data protection for users of SAP and CAD/PLM software is pleased to announce the recently formed competency partnership with Turnkey Consulting Ltd., the world’s Risk, Identity, and Security specialists.