Open in app

Sign In

Write

Sign In

Ankush Johar
Ankush Johar

95 Followers

Home

About

Dec 17, 2020

Brexit update: Phishing is a big issue!

Fishing is not the only contentious issue for Brexit, there is another ‘phishing’ issue businesses are having to deal with across Europe and the UK. With genuine Brexit updates being sent by most organisations — private and public — ‘Phishermen’ are having a field day! Malicious phishing groups are capitalising…

Brexit

3 min read

Brexit update: Phishing is a big issue!
Brexit update: Phishing is a big issue!
Brexit

3 min read


Nov 15, 2020

DMARC: Gartner’s Top 10 Security Projects for 2020–2021

On Sep 15, 2020 Gartner released a list of the top 10 security projects that security and risk leaders can deploy to mitigate risk in the current environment and drive business value. The ones we are glad got highlighted as a top priority are DMARC and Automating Security Risk Assessments. …

Cybersecurity

1 min read

Gartner’s Top 10 Security Projects for 2020–2021
Gartner’s Top 10 Security Projects for 2020–2021
Cybersecurity

1 min read


Nov 15, 2020

Stop Multiplying your cybersecurity investments by Zero!

You invest X million dollars protecting your assets, and then you multiply it by Zero! Cyber Security is multiplicative, not additive. More and more tech is being bought, and more being produced each day, to secure ‘crown jewels’ of organisations…

Humanfirewall

4 min read

Stop Multiplying your cybersecurity investments by Zero!
Stop Multiplying your cybersecurity investments by Zero!
Humanfirewall

4 min read


Nov 15, 2020

The biggest cause of security failure is phishing.

Whether you are on-premise or in the cloud, your worst enemy is phishing. It’s not how secure you ‘crown jewels’ are, it is how securely you are using them at each step! It really doesn’t matter where your server is or your application is, whether on-premise or in the cloud…

Phishing

2 min read

The biggest cause of security failure is phishing.
The biggest cause of security failure is phishing.
Phishing

2 min read


Sep 14, 2020

B2B Telco leaders need to think as a VC does.

B2C has been taken away by Whatsapp, Facebook, Google, Netflix — you get the drift. B2B on the other hand is as yet an open opportunity today. I say that B2B leaders in telecom companies need to think like VCs because they need to make bets on multiple companies and…

B2b Pricing

3 min read

B2B Telco leaders need to think as a VC does.
B2B Telco leaders need to think as a VC does.
B2b Pricing

3 min read


Sep 10, 2020

Security Ratings. Why they matter?

Cybersecurity risk scores or security ratings are either hated or loved by security professionals — with very few on the middle ground — because ratings are objective. Business needs to know where they stand in terms of security risk, and a risk score quantifies that. What you can measure, you…

Cybersecurity

2 min read

Cybersecurity

2 min read


Sep 2, 2020

What is Post-Delivery Protection?

A layered security mechanism to protect your most used digital asset: Email. The Swiss Cheese Model for Email Security. Since time immemorial, layered security or layered defence strategies have been used for protecting castles, cities, kingdoms and nations. You have a castle which has the outer city walls…

Humanfirewall

4 min read

What is Post-Delivery Protection?
What is Post-Delivery Protection?
Humanfirewall

4 min read


Aug 30, 2020

DMARC Override! Email getting delivered despite p=reject

You could be too important for your emails to be missed and other reasons. Your DMARC policy is on the highest enforcement, and yet your emails are getting spoofed! This is called DMARC Override. It is frustrating — we know. Why is it happening? Here’s why: Imagine you are the…

Dmarc

2 min read

DMARC Override! Email getting delivered despite p=reject
DMARC Override! Email getting delivered despite p=reject
Dmarc

2 min read


Aug 26, 2020

WTH is ReVoLTE? An attack that allows hackers to listen in on calls

Decrypt VoLTE calls with minimal resources. It’s a new attack that lets hackers decrypt VoLTE encryption to spy on calls! A small group of academic researchers from Ruhr University Bochum and New York University Abu Dhabi revealed an attack they’ve called ‘ReVoLTE’ that could allow remote hackers to break the VoLTE encryption to spy on targeted…

Volte

2 min read

WTH is ReVoLTE? An attack that allows hackers to listen in on calls
WTH is ReVoLTE? An attack that allows hackers to listen in on calls
Volte

2 min read


Aug 26, 2020

What is Permission Phishing?

‘Permission Phishing’ or ‘Consent Phishing’: When hackers phish without stealing credentials, but with permissions instead. ‘Permission phishing’ is aimed at stealing permissions, and not at stealing passwords. The apps seeking permission appear harmless, but once permissions are granted, it can wreak havoc and gives access to hoards of sensitive data. …

Humanfirewall

1 min read

What is Permission Phishing?
What is Permission Phishing?
Humanfirewall

1 min read

Ankush Johar

Ankush Johar

95 Followers

Cyber Security Investor

Following
  • Avinash Raghava

    Avinash Raghava

  • Michael Simmons

    Michael Simmons

  • Sridhar Pai Tonse - Marketer, storyteller, coach

    Sridhar Pai Tonse - Marketer, storyteller, coach

  • Ankur Jain

    Ankur Jain

  • Sequoia

    Sequoia

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech