Blog

Stay up to date with Payatu blog

Blog

Stay up to date with Payatu blog

Close the overlay

I am looking for
Please click one!

23/11/2020
surendra

Strengthening Cybersecurity in a Remote Work Environment

An eminent 2020 revealed that as many as 74% of organizations plan to shift a good part of their workforce to work in a remote environment permanently. Although this is good news for a lot of employee...

14/10/2020
surendra

How to get maximum value out of your security investment

In the words of the famous investment guru himself, Warren Buffet, “Wide diversification is only required when investors do not understand what they are doing.” So, Payatu is are here to guide you...

29/09/2020
murtuja

How to identify your Business Security Needs and Requirements

33 billion data records to be stolen in 2023 alone, that’s the number predicted by Juniper Research, and by some accounts, it might be a conservative one. The information will range from personal da...

24/09/2020
murtuja

7 things that can go wrong with a faulty Business Application Security System

7 things that can go wrong with a faulty Business Application Security System It’s no secret that cyberattacks have been on the rise both in terms of numbers and sophistication. However, applica...

30/08/2020
dattatray

IoT Security - Part 12 (MQTT Broker Security - 101)

MQTT Broker Security - 101 This blog is part of IoT Security series where we discuss the basic concepts pertaining to the IoT/IIoT eco-system and its security. If you have not gone through the pre...

12/07/2020
nikhilj

SEC4ML Part-2: Adversarial Machine Learning attacks

This is the SEC4ML subsection of the Machine Learning series. Here we will discuss potential vulnerabilities in Machine Learning applications. SEC4ML will cover attacks like Adversarial Learning, Mode...

11/06/2020
dattatray

IoT Security – Part 6 (ZigBee Security - 101)

ZigBee Security 101 This blog is part of the “IoT Security” Series. If you haven’t read the previous blogs (parts 1 - 5) in the series, I urge you to go through them first unless you are alr...

10/06/2020
nikhilj

Security and privacy of AI or ML applications - A layman's guide

Machine Learning(ML) is under exponential growth these days. Businesses, Academia and tech enthusiasts are really hyped about trying out ML to solve their problems. Students are driven to learn this n...

29/04/2020
murtuja

The Emerging $5 Trillion Economy to Receive a Cybersecurity Policy Upgrade in 2020

The Emerging $5 Trillion Economy to Receive a Cybersecurity Policy Upgrade in 2020 The National Security Council Secretariat sought suggestions and comments to form the National Cyber Security Str...

08/04/2020
murtuja

Navigating the High Cost of a Data Breach

Navigating the High Cost of a Data Breach In the first article in this two-part series, we covered the factors that add to the cost of a data breach, the parameters that play a role in increasing ...

07/04/2020
murtuja

Calculating the cost of a data breach

Calculating the cost of a data breach Data breaches eat away at customer trust, brand image, and the overall reputation of a company. By November 2019, 7.9 billion records had been exposed tied to...