cyber Adventura

cybersecurity


  • The next big “Security topic” in 2026

    The verdict is out. AI is the buzzword. Governments, regulators, utilities, society at large, global and local corporations are grappling with the proliferation of Artificial Intelligence and its impact on our lives. A simple illustration can be made out of a that of a benign photograph will become a tool of misinformation taking form of Continue reading

  • Cybersecurity Frameworks, who are they ?

    ” Rule books tell people what to do. Frameworks guide people how to act. Rule books insist on discipline. Frameworks allow for creativity.” Simon Sinek The Dictionary meaning of the work Frameworks means a basic/ foundational structure underlying a system and/or a concept.In practical terms it can be a conceptual structure with the intent to Continue reading

  • Spreading phishing awareness to my old folks

    Dad : Do you remember Taj, my ex colleague, he got duped, almost all of his savings was gone !! Me : How on earth ? Dad : (sighs) Yeah, he apparently got a phone call from his bank, shared his personal information, somehow those crooks stole his lifesavings. Mom : (pensive) this is happening everywhere, I will keep Continue reading

  • Movies as a metaphor to grasp cybersecurity principles

    The foundation principles of cybersecurity are core concepts and practices that help protect computer systems, networks, and data from various threats and vulnerabilities. These principles serve as a framework for building a robust cybersecurity posture.Relatability often helps us to reinforce our understanding and strengthen our knowledge in the domain. So I thought of adding some Continue reading

  • Information technology ! A funny redux

    In our earlier blogs, we have been talking about cybersecurity or information security , but it just can’t be contextualised if one doesn’t understand the overarching concept. Thats where IT or Information Technology or OT or Operational Technology comes in. In our previous blog we have already explained what OT is. Now let’s explain IT. Continue reading

  • The story of vulnerabilities

    Imagine you’re at a buffet, surrounded by all kinds of delicious food. You’re famished, and the sight of healthy and tasty food can’t hold you back. But suddenly, a tiny fly appears out of nowhere and starts buzzing around your plate. You try to swat it away, but it’s persistent and keeps bothering you. That Continue reading

  • TTP . Tactics, Techniques and Procedures

    In our earlier blogs, we spoke about threat actors and their motivation, the attack surfaces they will use to mount an attack. But how will they gain an entry and what will they gain and/or achieve ? And most importantly how will the good guys (read Cybersecurity professionals) figure out the modus operandi and stop Continue reading

  • Constructing a Cybersecurity Threat landscape

    A cybersecurity threat landscape refers to the overall view of potential threats and risks that an organisation might face from cybersecurity. It includes a comprehensive analysis of various types of threats, their potential impacts, and the likelihood of their occurrence. The goal of assessing the threat landscape is to develop effective strategies to manage and Continue reading

  • Understanding Attack Surfaces

    Every now and then we encounter news that there has been cyberattacks on an organisation, some websites have been defaced, or there has been a data breach. Such news do make us wonder how that happened in the first place !! How did they break into the organisation , what were the points of entry Continue reading

  • Cybersecurity is multidisciplinary and constantly evolving

    Last summer I bumped into an old friend from school. An accomplished law graduate from one of the Ivy League Universities , he was working on a task force from a Government organisation regulating cybersecurity. I was a bit baffled and asked him if his non technical background could be limiting factor in understanding the Continue reading