Editorial
Expressions & POVs
Expert takes, practical perspectives, and opinionated security narratives.

Point of View
Everything You Need to Know about Cybersecurity in Retail
Everybody shops online or in supermarkets and shops. The digital transformation has aided and simplified how we shop. But every change comes with a drawback, too. So, in the case of the retail industry, the drawback is the drastic rise in hackers targeting them over the last few years. So, what is t...

Point of View
Story of Cyberattack – Change Healthcare
Even the most trusted healthcare providers aren’t immune to cyberattacks. One such victim was “Change Healthcare”, a major company in the healthcare industry, providing essential services such as data analytics, payment processing, and software for healthcare systems. Founded to streamline healthcar...

Point of View
Everything you Need to Know about Linux Patch Management
In today’s IT environment, the security of your Linux systems is paramount as they are heavily dependent OS by developers. With cyber threats constantly evolving, effective patch management for linux is your frontline defense; essential updates keep everything running smoothly and safely. Yet, navig...

Point of View
Proactive vs Reactive Cybersecurity
Organizations are constantly under threat from cyberattacks. Hackers are more creative than ever, and the threat landscape continues to grow. Every 39 seconds, a cyberattack occurs somewhere in the world. With the average cost of a data breach costing up to $ 4.45 million in 2023. The key to staying...

Point of View
Understanding Centralized Patch Management: One View for All Your Patches
Would you rather have different dashboards for each of your OS groups and jump through multiple hoops to get info and patch your devices? Or just a single one to do it all? The answer is obvious, right? Centralized patch management is the superior way of doing things, and you are missing out on a lo...

Point of View
Securing Every Angle – A Threat Model for an IoT Enabled Smart Parking System
Welcome to the second part of this two-part blog on IoT security! The first part explained how IoT-enabled self-driving cars work and how to secure communications between them. You can read the first part here.

Point of View
Eyes, I Mean Sensors On the Road – Understanding and Safeguarding IoT in Cars
I recently started learning to drive. The first class left me panicked and overwhelmed. The Herculean task of turning, as well as having to remember that the car took up more space than just my seat, left me never wanting to drive again. Subsequent classes were less scary, but I still found myself w...


