Lakshmi SanthoshinSecurity QuotientTop five tips to secure online meetingsWith the widespread adoption of video conferencing to stay connected, the associated threats have increased drastically, ranging from…Mar 25, 2022Mar 25, 2022
Lakshmi SanthoshinSecurity QuotientTop 5 cloud security checklistWith more and more businesses moving to the cloud, threats actors are increasingly innovating to get a hold of cloud data. Understanding…Mar 25, 2022Mar 25, 2022
Lakshmi SanthoshinSecurity QuotientThree tips to respond to a network breachWith threat actors getting more creative than ever, it has become increasingly hard to avoid network breaches. The key to limiting the…Mar 25, 2022Mar 25, 2022
Lakshmi SanthoshinSecurity QuotientSecure coding — Top 5 security guidelines you should knowThreat actors are constantly and consistently trying to break into applications. Are you proactively thinking about security while…Mar 3, 2022Mar 3, 2022
Lakshmi SanthoshinSecurity QuotientStaying ahead of supply chain cyber attacksAlarmed about the rate at which supply chain attacks are proliferating? Threat actors have turned their focus to suppliers as they are…Feb 24, 2022Feb 24, 2022