Gorav Arora

Author Archives: Gorav Arora

IDG Contributor Network: Educating the public about security – are we doing it all wrong?

In 2016 consumers were exposed to a larger number of high profile data breaches than any year previously. According to the Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86% compared to 2015. Identity theft was the leading type of data breach last year, accounting for 59% of all data breaches. These numbers have helped raise public awareness around the serious threats to personal data that exist in the modern era, and awareness is also growing for some of the solutions that businesses and individuals can use to minimize the risks from data breaches. But is it enough?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Educating the public about security – are we doing it all wrong?

In 2016 consumers were exposed to a larger number of high profile data breaches than any year previously. According to the Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86% compared to 2015. Identity theft was the leading type of data breach last year, accounting for 59% of all data breaches. These numbers have helped raise public awareness around the serious threats to personal data that exist in the modern era, and awareness is also growing for some of the solutions that businesses and individuals can use to minimize the risks from data breaches. But is it enough?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Hacking for the greater good

In Jason’s last post, he discussed how we are apt to see more intricate and complex data integrity attacks this year, with the adversaries’ main motivation being financial gain and/or political manipulation.As the cyber landscape becomes increasingly complex, private enterprises and public entities are looking for ways to better protect information and preserve the integrity of their data, while individuals want to ensure that the internet remains open and provides equal access to information to all. And while there are a number of technologies that are valuable, people are now being recognized as a powerful tool to solve these problems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Hacking for the greater good

In Jason’s last post, he discussed how we are apt to see more intricate and complex data integrity attacks this year, with the adversaries’ main motivation being financial gain and/or political manipulation.As the cyber landscape becomes increasingly complex, private enterprises and public entities are looking for ways to better protect information and preserve the integrity of their data, while individuals want to ensure that the internet remains open and provides equal access to information to all. And while there are a number of technologies that are valuable, people are now being recognized as a powerful tool to solve these problems.To read this article in full or to leave a comment, please click here