1. What is a keylogger?  A Keystroke logger is essentially a surveillance technology which tracks all pieces of information typed on a keyboard including but not limited to passwords, web history, conversations, and saved files. These are all personally identifiable information. This information is then saved in...

Vulnerability management is more than just running tests and identifying gaps. Rather it is a process to detect weaknesses and proactively fix them before they are exploited. Vulnerability management lifecycle includes planning and prioritizing to mitigate potential risks and threats. In this blog we discuss...

Cyber security threats are growing in numbers and severity every year. A cyber threat is no longer just an IT issue. It brings serious business risks that include financial and reputational damage and loss in customer confidence. The widely publicized Facebook-Cambridge Analytica data scandal was...