Extension towards Adoption and Implementation of Cybersecurity and Cyber Resilience Framework (CSCRF) for SEBI Regulated Entities (REs)
CIRCULAR SEBI/HO/ ITD-1/ITD_CSC_EXT/P/CIR/2025/96 June 30, 2025 To, All Alternative Investment Funds (AIFs) All Bankers to an Issue (BTI) and Self-Certified Syndicate […]
Seconize Researchers Discover and Responsibly Disclose Critical IRCTC Vulnerability Exposing User Data
Bengaluru, India – June 19, 2025 – Cybersecurity researchers at Seconize, a leading provider of cyber risk and compliance automation solutions, have […]
Seconize Researchers Uncover and Help Fix IRCTC Vulnerability
IRCTC Vulnerability: Introduction Note – A big shoutout to Rohan Kar, one of our security researchers at Seconize, for identifying a critical […]
The Vulnerability Management Trilemma: Which Path Will You Take?
Like the proverbial pond teeming with fish and the lurking fisherman, our digital environments are rich with valuable data, and malicious actors […]
FAQs on Cybersecurity and Cyber Resilience Framework (CSCRF) for SEBI REs and Framework for Adoption of Cloud Services by SEBI REs
Frequently Asked Questions (FAQs) on Cybersecurity and Cyber Resilience Framework (CSCRF) for SEBI REs and Framework for Adoption of Cloud Services by […]
SBOMs 101: The Beginner’s Guide to Software Nutrition Labels
Cyber risks have become a significant concern for organizations worldwide. These risks come in various forms and can originate from multiple sources. […]
Understanding and Managing Different Types of Cyber Risks
Cyber risks have become a significant concern for organizations worldwide. These risks come in various forms and can originate from multiple sources. […]
Don’t Be a Gnome: Proactive Vulnerability Management
The “Underpants Gnomes,” a memorable creation from the South Park episode “Gnomes,” have a famously incomplete business plan: “Phase 1: Collect Underpants, […]
The Five Monkeys and the Compliance Trap
There’s a parable often cited in behavioral science circles — simple, almost whimsical on the surface, but deeply revealing. The experiment may […]
The Panopticon Effect and Compliance Monitoring
In the late 18th century, English philosopher and social theorist Jeremy Bentham proposed a radical architectural design for prisons known as the […]
The Butterfly Effect in Cybersecurity: How Small Vulnerabilities Lead to Massive Breaches
In the world of cyber risk management, the Butterfly Effect serves as a powerful metaphor. A minor security flaw—just like the flap […]
Super Wicked Problems in the Context of Cybersecurity
The term “super wicked problems“ was first introduced in a 2012 paper by Kelly Levin, Benjamin Cashore, Graeme Auld, and Steven Bernstein. […]