Security Services

The Mail-Room Locker and Perils of Cyber Security

You must be thinking how can a mail room locker be a topic for a cyber security professional, that too the snail mail box, not the ones that are cluttering your inbox right now on this computer, I have a real story to tell, a snail mail which could expose you to hackers online, yeah...

Security Services

The Insecurity of Things

Cyber-attacks has grown leaps and bounds in the last one year in the IoT world. Many IoT devices lack stringent security measures and this makes it easy for the cyber attackers to exploit the vulnerabilities. Some of the classic cyber-attack cases that has happened in the recent past are

Security Services

Going to war with APT

An advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long time. APT attackers are data stealers and target high value information. Unlike other attacks where the intruders sneaks in and gets out...

Security Services

Cybercrime at 10,000 feet and above

As we were updating this article FBI today (29.04.2015) sent a warning to airlines to check for any suspicious activities where passengers are connecting unknown cables or wires to the inflight entertainment, or they have been advised to check inflight system logs frequently for any...

Security Services

The new age harsh reality, buying hacking and malware service online

In the barrage of cyber security news that has been making waves on international media recently, this heading somewhere in the swarm of websites would have easily missed your attention “Prices fall, services rise in malware-as-a-service market”.

Security Services

How not to wake up and find your data on the dark side of the internet

Data breaches have become the order of the day, just a couple of weeks back one of the major Hollywood production company and entertainment industry giant got hacked and was robbed of several gigabytes of confidential to ultra-sensitive information. The damage is still being undone as we...

Security Services

The Roadmap for intelligent security

Conventional security strategies are being constantly challenged by newer and smarter threats – APTs and AETs to name two. CISOs and CIOs are becoming extremely careful of where they tread, because most defense strategies are being effortlessly infiltrated.

Security Services

Can you really trust your peripherals?

Global threat scenario is evolving too fast, with attackers finding different ways to pilferage and exfilterate data out of your network, security teams have to be proactively alert and defend their information. While traditional security has been largely addressing an organization's...

Security Services

Create a superman to protect your network and keep your intruders at bay

CISO’s and CIO’s are increasingly becoming wary of these new age threats like APT (advanced persistent threats)’s, AET (advanced evation techniques)’s, zero day advanced malware. These have the capability to deflect all kinds of defense strategies and exfilterate confidential information...

Page 1 of 1

About CSS Corp Blog


The CSS Corp blog brings you insights from the world of technology and disruptions that are shaping the digital age. Subscribe now to learn the art of delivering exquisite customer eXperience for today's digital economy


see all