Cygilant Blog

Vijay Basani

Recent Posts

Introducing Cygilant

Posted by Vijay Basani on Sep 19, 2017

I would like to thank you for your continued support, trust, and partnership on our journey to a world where every organization, regardless of size, has the enterprise class security and compliance posture they deserve. With your valuable feedback, our dedicated team of engineers continues to enhance industry best Security Operations and Analytics Platform, SOCVue. Our Global SOC security engineers leverage SOCVue 24x7 for incident detection and analysis, incident response and remediation guidance to mitigate risk.

How a Data Breach Hurts a Retailer's Bottom Line

Posted by Vijay Basani on Dec 23, 2016

Retailers will see some major financial impact following a big breach.

Retailers are some of the most vulnerable organizations when it comes to data breaches. Due to the fact that these companies have to process enormous amounts of customer financial information, it simply makes sense that hackers would do everything they can to get past cybersecurity defenses. 

Outside of the fact that a significant cyberattack will forever change how customers view your company, these incidents generally have significant financial fallout. To that end, what can a retailer expect to deal with when they're the victim of a data breach?

How Does a Cardholder Data Breach Happen?

Posted by Vijay Basani on Dec 21, 2016

What happens when card security can't hold back the hackers?

Due to the fact that credit and debit card data can be used to anonymously purchase goods and transfer money online, this information has become highly sought after in the criminal underworld. Hackers are compensated generously for gaining access to these cards, and are therefore motivated to break into the systems that hold them. 

But exactly how do these individuals go about getting a hold of this information? Let's dive in: 

Understanding the Increased Complexity of Cyber Threats

Posted by Vijay Basani on Nov 30, 2016

Cybersecurity is becoming increasingly more complex.

Is your company spending more and more money on trying to keep up with the increased complexity of cyber threats?

You're welcome to be alarmed (it's a perfectly normal response). But don't be shocked. Cybercriminals, who often have plenty of time and resources to devote to their craft, are constantly becoming more sophisticated. And companies typically have to spread their resources out to various departments, limiting their ability to fully secure themselves. Sure, most have IT teams (or at minimum a dedicated IT professional), but that doesn't mean they're completely capable of handling the complexity and vast amount of threats bombarding their servers.

Data Breach Details: The Australian Red Cross Has Over 1.2 Million Records Stolen

Posted by Vijay Basani on Nov 15, 2016

The Australian Red Cross forgot to lock the backdoor to their IT databases, and information was stolen.

The Australian Red Cross is currently dealing with a massive IT security mishap that exposed thousands of Red Cross blood donors' personal information.

"The leak disclosed blood type, previous donations information and donor eligibility answers."

The IT leak didn't just reveal information such as names, telephone numbers, emails, addresses, and birth dates. It also disclosed blood type, records of previous donations, and donor eligibility data.


Troy Hunt, an IT security expert, first discovered the leak after someone contacted and provided him with a snippet of data from that included his personal information. The person then gave Hunt the entire set of data (1.74 GB or 1,286,366 records). The information also included Hunt's wife's personal information.

What are the Most Common IT Security Vulnerabilities?

Posted by Vijay Basani on Nov 3, 2016

Companies must be prepared for even the most common IT security breaches.

Businesses must take IT security seriously because their financial future depends on it. IT security is a broad topic that covers a range of different fields.

Here we'll discuss common vulnerabilities and why companies must ensure their operational systems are well-protected from cybercriminals.


"Interjection vulnerabilities are one of the most common and oldest web application vulnerabilities."

1. Injection vulnerabilities

Interjection vulnerabilities, such as cross-site scripting and CRLF injection, are one of the most common and oldest web application vulnerabilities because it's easy for cybercriminals to access and affect (or infect) them.

Data Breach Details: Eddie Bauer Stores

Posted by Vijay Basani on Sep 23, 2016

Eddie Bauer's stores were recently breached by cybercriminals.

Protecting critical business data and customer information should not be taken lightly. The latest example of a major data breach comes out of Eddie Bauer, a clothing store chain located in Washington.


"Not every Eddie Bauer

customer was affected by the breach, but all would receive identity protection."

The company recently released a statement notifying its customers that its North American stores had been compromised by a security hack between January 2 and July 17 of this year. It did note that not every customer was affected, but that all customers would receive identity protection for 12 months.

In Charge of Your Company’s Cybersecurity? 3 Tips to Handle That Responsibility

Posted by Vijay Basani on Aug 4, 2016

CISOs (Chief Information Security Officers) or others who are in charge of a company's cybersecurity face a huge responsibility: they have to keep their firms' IT assets safe not just from malicious insiders and accidental leaks, but also from every hacker around the globe—at a time when more hacking scandals happen all the time.


EiQ has previously discussed the technical, interpersonal, and leadership skills required for CISOs to meet this challenge, and today we add three tips they can follow in order to perform at their best and manage the responsibility of their role.

Here Are the Skills You Need to Be a Chief Information Security Officer

Posted by Vijay Basani on Jun 29, 2016


The position of Chief Information Security Officer (CISO) is a crucial one within an organization, as the role calls for "superhero"-like responsibilities. CISOs are the executives responsible for stopping the thousands of hackers who may be out there attempting to breach businesses around the clock. To accomplish this challenging work, CISOs will be best equipped if they bring the following three types of skills to the job.

3 Important Lessons from the QNB Hack

Posted by Vijay Basani on Jun 6, 2016


News broke in late April 2016 that Qatar National Bank (QNB), the second largest financial institution in Africa and the Middle East, had suffered a massive data breach. Details of this compromise have been hard to come by, and what hackers and other groups might be doing with the data leaked from QNB remain a matter of speculation for now. QNB has since released two statements that provide a few details about the intrusion.

Most Recent Posts

Subscribe to Email Updates