Author: Jeyaraman Thiruvengadam

Dirty Pipe – Privilege Escalation Vulnerability in Linux

Dirty Pipe – Privilege Escalation Vulnerability in Linux

Linux is found to have yet another severe privilege escalation vulnerability (CVE 2022-0847) in kernel version 5.8 and above. This vulnerability is allowed bad actors to execute malicious code that can act as a host to destructive actions like installing backdoors into the system, injecting code into scripts, and even creating unauthorized user profiles. This

Read More
Adopting Zero Trust Model

Adopting Zero Trust Model

From Zero to Hero Employees are not limited to the office building like in the old days. The remote working had effects on literally everything. Organizations today need a comprehensive security strategy to manage the complexities of securing the data. From perimeter-based security to Zero trust architecture, we have come a long way. Let us

Read More
Best practices for Data Loss Prevention

Best practices for Data Loss Prevention

We know that data is what drives the technology today. Data is a distinctive type of information that is collected and translated for a specific purpose. If the data is not formatted in the right way, it does not provide any value to both humans and computers. Data is considered sensitive when it gives classified

Read More
6 Crucial Features of a Reliable GRC Tool for Your Company

6 Crucial Features of a Reliable GRC Tool for Your Company

With the uncertainty brought by the pandemic, businesses need to check on their governance, risk, and compliance framework. According to the 2019 State of Enterprise Risk Management, 62% of the surveyed organizations have experienced a critical risk event for three years. Such risks are inevitable, which is why governance, risk management, and compliance must be

Read More