murtuja

...
...
27-August-2020
murtuja

10 Most Exploited Software From 2016 To 2020

10 most exploited Software from 2016 to 2020 US CERT has published the list of top 10 vulnerabilities that have been exploited between 2016 and 2020. Based on that, we have prepared the list of af...

29-April-2020
murtuja

The Emerging $5 Trillion Economy to Receive a Cybersecurity Policy Upgrade in 2020

The Emerging $5 Trillion Economy to Receive a Cybersecurity Policy Upgrade in 2020 The National Security Council Secretariat sought suggestions and comments to form the National Cyber Security Str...

8-April-2020
murtuja

Navigating the High Cost of a Data Breach

Navigating the High Cost of a Data Breach In the first article in this two-part series, we covered the factors that add to the cost of a data breach, the parameters that play a role in increasing ...

7-April-2020
murtuja

Calculating the cost of a data breach

Calculating the cost of a data breach Data breaches eat away at customer trust, brand image, and the overall reputation of a company. By November 2019, 7.9 billion records had been exposed tied to...