Don’t Be a Gnome: Proactive Vulnerability Management
The “Underpants Gnomes,” a memorable creation from the South Park episode “Gnomes,” have a famously incomplete business plan: “Phase 1: Collect Underpants, […]
SEBI Extends Cybersecurity and Cyber Resilience Framework Compliance Deadline for Regulated Entities
In an important development for financial market participants, the Securities and Exchange Board of India (SEBI) has announced a three-month extension for […]
Understanding and Managing Different Types of Cyber Risks
Cyber risks have become a significant concern for organizations worldwide. These risks come in various forms and can originate from multiple sources. […]
SBOMs 101: The Beginner’s Guide to Software Nutrition Labels
Cyber risks have become a significant concern for organizations worldwide. These risks come in various forms and can originate from multiple sources. […]
FAQs on Cybersecurity and Cyber Resilience Framework (CSCRF) for SEBI REs and Framework for Adoption of Cloud Services by SEBI REs
Frequently Asked Questions (FAQs) on Cybersecurity and Cyber Resilience Framework (CSCRF) for SEBI REs and Framework for Adoption of Cloud Services by […]
The Vulnerability Management Trilemma: Which Path Will You Take?
Like the proverbial pond teeming with fish and the lurking fisherman, our digital environments are rich with valuable data, and malicious actors […]
Seconize Researchers Uncover and Help Fix IRCTC Vulnerability
IRCTC Vulnerability: Introduction Note – A big shoutout to Rohan Kar, one of our security researchers at Seconize, for identifying a critical […]
Seconize Researchers Discover and Responsibly Disclose Critical IRCTC Vulnerability Exposing User Data
Bengaluru, India – June 19, 2025 – Cybersecurity researchers at Seconize, a leading provider of cyber risk and compliance automation solutions, have […]
Extension towards Adoption and Implementation of Cybersecurity and Cyber Resilience Framework (CSCRF) for SEBI Regulated Entities (REs)
CIRCULARSEBI/HO/ ITD-1/ITD_CSC_EXT/P/CIR/2025/96June 30, 2025 To,All Alternative Investment Funds (AIFs)All Bankers to an Issue (BTI) and Self-Certified Syndicate Banks (SCSBs)All Clearing CorporationsAll […]
Understanding CERT-In’s Comprehensive Cyber Security Audit Policy Guidelines (2025): What Organizations Must Know
Note: This blog is issued under public interest On July 25, 2025, the Indian Computer Emergency Response Team (CERT-In) released the CERT-In’sComprehensive […]
Crying Wolf: A case for risk assessment in vulnerability management
“There was once a shepherd boy who kept crying ‘Wolf! Wolf!’ just to see people panic… until one day, the wolf really […]
Unlocking Software Transparency: SBOM Implementation with Real-World Case Studies
🔍 Introduction to SBOM Implementation Modern software systems are built on complex layers of third-party, open-source, and proprietary components. Without visibility into […]