Author: Sreeja Sinha

Cloud Security Myths Busted

Do You Know How To Spell Security?

We are a generation that has seen technology grow from a small Nokia 1011 to multiple companies offering smartphones. These smartphones can store years of photos, video call people on the other hemisphere, take pictures of the shooting stars, and what not! The ease of accessibility of everything is the result of eternal ambition and

Reading Continue
What success looks like?

Metrics For Defining Your DevOps Goals and Call It A Success

Measuring your DevOps' success rate in your organization is not like a regular term paper you turn in. There is no guaranteed way to give it an A+ because it looks perfect or a B- just because it has some loopholes, according to you. There are several factors associated with it that you need to pay attention to. It stems from how you define DevOps at your workplace.

Reading Continue

Increased Cybersecurity attacks is an ugly truth in this pandemic but your organization can avoid being a victim

The current Covid-19 pandemic has changed several dynamics of the world. Education has majorly moved to digital platforms. People are opting for digital transactions and saying no to physical banking infrastructure. Further, major IT companies and multinational companies have shifted to work from home opportunities. As wonderful and convenient as the new ways look and sound, it is undeniable that the internet has become increasingly dangerous. Cybercriminals are always waiting for opportunities to attack servers, steal sensitive information, and wreak havoc. Government offices, as well as private firms, are extremely vulnerable to such cyberattacks. Cybercriminals are overwhelming the system by ...

Reading Continue

A Practical Step by Step Guide To Prevent Security Breach Of Your AWS Account

Amazon Rainforests, the world's largest rainforest, is crisscrossed with several rivers, inhabits over a thousand types of flora and fauna. It is so densely populated with greenery that only the person knowing the exact right path can find it once something goes inside. In other words, it is secure. Probably Amazon Web Services got inspired by its namesake while building its robust security schemes. Let us dive into the several methods you can incorporate in your AWS working to stay safe from security breaches! 

Reading Continue

Introduction to ISO 27001 if you are using AWS, Azure or GCP cloud

ISO 27001 is a specification for an Information Security Management System (ISMS). An ISMS forms a framework of policies and procedures that includes all kinds of legal, physical, and technical controls involved in an organization’s information risk management processes. The basis of this certification is the development and implementation of a rigorous security program, which includes the development of the Information Security Management System (ISMS).

Reading Continue
PCI DSS Compliance from

A quick introduction to PCI Compliance and Key Aspects To Know

PCI Compliance stands for Payment Card Industry Compliance. It is a defined set of standards/protocols that are maintained to protect the privacy of the credit cards’ owners during all the financial transactions. These protocols apply to all those concerns that accept credit card payments. It is applicable for all those store, process and transmit cardholder data. 5 major credit card companies came forward to create these to ensure a safe transaction and online payment experience.

Reading Continue
Cloudanix Clouds

CASB, CSPM, SEIM: Do you know what role they play in operating your Cloud workloads?

Not long ago, when IT companies were into storing all their data on-premise, clouds were just white, cotton-like things floating in the sky. With the recent uproar about cloud computing, clouds are now condensed with your data. The advantages are overflowing, first is its accessibility. Using the cloud gives access to your files from anywhere

Reading Continue