top of page

Cyber Vigilance
Group

Resources

Here are articles written by Sudhir that will help you learn about AI, cyber vigilance, cyber crime, and cyber safety.

Adjectives for Failure  

What would you call an army general who doesn’t train his soldiers but expects them to defend the border? Similarly, what would you,,,

Published on March 28, 2025

Is Cyber Safety a Myth?

For long, I have been a proponent of cyber vigilance which I believe is the ONLY way cyber safety can be achieved. There are valid and …

Published on March 10, 2025

Top 7 Reasons Why It Takes Organizations 7 Months To Detect A Breach

Cybersecurity reports such as IBM's Cost of a Data Breach Report, over the last several years, have consistently revealed that organizations take an average of 7 months…

Published on February 23, 2025

Data Protection and Data Privatection and Data Privacy Challenges in Hyper-Personalization

Hyper-personalization is an advanced marketing strategy that leverages data and advanced technologies to create highly tailored experiences…

Published on January 27, 2025

How accurate are the predictions made by Predictive AI?

Since the beginning of civilization, human beings have liked the idea of knowing the future. Seers, oracles, soothsayers, astrologers, and shamans…

Published on December 14, 2024

Cyber Safety for Startups

While this is great from the success perspective, this haste and narrow focus often come at a price that is not often even considered by the promotors…

Published on December 2, 2024

How Cyber Crimes Targeting Individuals Can Be Stopped- Part 4 - Mobile Phone Manufacturers & Mobile Apps

This is the fourth part of a multi-part series in which we will discuss and recommend ways to stop cyber crimes targeting individuals…

Published on August 5, 2024

How Cyber Crimes Targeting Individuals Can Be Stopped- Part 3 - Telecom Companies & Domain Registrars

This is the third part of a multi-part series in which we will discuss and recommend ways to stop cyber crimes targeting individuals…

Published on July 22, 2024

How Cyber Crimes Targeting Individuals Can Be Stopped- Part 2 – Social Engineering Lifecycle

This is the second part of a multi-part series that will discuss and recommend ways and means to stop cyber crimes targeting individuals…

Published on June 30, 2024

How Cyber Crimes Targeting Individuals Can Be Stopped- Part 1

This is the first part of a multi-part series that will discuss and recommend ways and means to stop cyber crimes targeting individuals…

Published on June 23, 2024

Data Protection And Privacy Laws Need Strengthening

The World’s first data privacy law was enacted by the German state of Hessia on September 30, 1970. Since then, over eighty nations have legislated data protection and privacy laws…

Published on June 19, 2024

AI or Snake Oil?

These days, AI is being promoted just like Snake Oil, which in the olden days was sold as a “cure-all. Therefore, it is not surprising…

Published on April 22, 2024

Death of Coding

Recently, Jensen Huang, the CEO of Nvidia, announced the death of coding because AI will do the work…

Published on April 2, 2024

Safety or Security?

Which would you select? Let us define these two terms before we proceed further. ·       Safety is the state of being "safe," i.e., the condition of being protected from harm…

Published on March 8, 2024

Are Your Vendors Cyber-Secure?

A few days ago, the following news was reported by many publications. Bank of America names Infosys' US unit in data breach notification to office of Maine Attorney General…

Published on February 26, 2024

Could cybersecurity have saved SolarWinds, Microsoft Blue Bleed or such other Breaches?

Though cybersecurity is everyone’s favorite beating boy, in all honesty, every cybersecurity expert should think deeply about the question above. Despite extensive cybersecurity…

Published on February 19, 2024

 

Why every CEO & CISO MUST peruse the SEC vs Solarwinds case!

In an unprecedented move, on October 30th, 2023, the SEC (Securities and Exchange Commission) of the USA sued the software company…

Published on Jan 17, 2024 - 4 min read

 

The Hullabaloo About Deepfakes

Deepfakes have grabbed everyone’s attention these days. Several celebrities are receiving unwanted attention as their deepfakes do the…

Published on Dec 12, 2023 - 3 min read

 

A New Insider Threat Has Been Found!

Insider threats are the most dangerous kind in the cybersecurity world. It is because no one expects any insider to betray their company.

Published on Nov 20, 2023 - 6 min read

 

Cyber Vigilance for AI

Artificial intelligence (AI) has taken the world by storm. Every business organization is in a frenzy to use this miracle genie to better…

Published on Aug 4, 2023 - 7 min read

 

Cyber Safety Challenges in Indian Banks

As cyber safety situation worsens (even FBI got hacked few days ago), there is no option but to make every effort to reduce the chances of…

Published on Nov 17, 2021 - 3 min read

 

Mapping Cyber Risk Heat-spots Part 1 - People

Thinking of cybersecurity evokes terrifying images of hackers breaking and entering into one’s systems and stealing confidential data. Such…

Published on Oct 8, 2021 - 9 min read

 

One Simple Step Can Cut the Risk of Cyber Breach By More Than Half

Surprised! Well, read on then.

Published on Sep 2, 2021 - 3 min read

 

Cyber-HAFTA, next on the Cybersecurity horizon

In India, protection money paid to criminal organization for protection, is called ‘HAFTA” (the word means a week and since this money is…

Published on May 15, 2021 - 3 min read

 

Has cybersecurity failed to deliver? Part 2

This is the second part of the second article of a three-article series on why cyber vigilance is important.

Published on Apr 25, 2021 - 5 min read

Has cybersecurity failed to deliver? Part 1

Cybersecurity Ventures predicts global cybercrime costs to grow by 15 percent per year over the next five years, reaching $10.5 trillion…

Published on Apr 21, 2021 - 7 min read

 

Breach in your network… Who ya gonna call?

It’s kind of a silly question to ask, but who will you call if there is a cyber-breach in your network?

Published on Apr 16, 2021 - 6 min read

 

Alarming Growth of Cyber Crime

It has been observed that technology used by criminals, keeps pace with and more often than not outpaces the progression of science and…

Published on Aug 11, 2020 - 2 min read

bottom of page