Blogs

blog
blog image
Bystander Intervention Training in Sexual Harassment Prevention

Sexual harassment has not really shown a decline with time. In a study conducted in 2018, 59% of women and 27% men have admitted to have received unwanted sexual […]

Read more

blog image
Who does the California Consumer Privacy Act apply to?

California Consumer Privacy Act (CCPA) is one of the first citizen privacy protection act formulated to bring customer data transparency against personal data use by companies for various […]

Read more

blog image
Information security best practices for employees in 2020

Information Security & Cyber Security are used interchangeably to indicate the practice of preventing illegal access to information, be it personal or professional. In the era of the […]

Read more

blog image
Importance of Information Security Awareness

Information security is often tied with the technical sophistication of implementation measures that protect the information against provincial cyber attacks. However, today, many Chief Information Security Officers(CISOs) &  […]

Read more

blog image
Difference between Cyber Security and Information Security

Cyber Security and Information security are often used with the same reference, considering the apparent similarities that surface. However, when dug deep in, it is evident that both […]

Read more

blog image
Similarities and Differences between CCPA and GDPR

The data breach and unauthorized exploitation of information has been a major area of crisis since the advent of the internet. With the ease of access to information […]

Read more

blog image
What is Keeping CISOs Awake at Night?

Chief Information Security Officers (CISOs) are the people, who are on one’s own hook to ensure the IT infrastructure security including information and network security at the organization […]

Read more