+91-141-2209655 [email protected]

Bulwark’s Blog

Cyber-Security Predictions for 2020

The Internet has become a common solution to most problems of the modern world; from payments to a bank transfer, communication through messages, emails or any other online resources, from shopping to studying, the internet has touched many aspects of life. From observations of past…

Critical Elements of an Incident Response Plan

The incident response plan is an organized approach to manage and address the aftermath of a cyber incident. The main objective of developing the incident response plan is to minimize the damages done to the data & IT infrastructure. Data breaches & security incidents will…

Mobile Devices – Secure them now!

Viruses, malware, phishing — by now, these are familiar terms. Many of us think of these and other cyber threats as risks only to desktop and laptop computers, but cybercriminals increasingly target mobile devices. Mobile devices are extremely vulnerable because more of the personal data…

OWASP Top 10 – The Unsung Rescuer  

Technology in the current scenario is ever advancing. Every new day brings about new developments in this vibrant and turbulent tech industry. To sail through and develop successfully, an unbiased, genuine and easy-to-access source of information is needed. OWASP aims to educate developers, designers and business…

Data Breaches – Cyberspace Warfare 

Every battle in history has been known for its tactical approach, attacks & sacrifices. No two battles in history have been alike. The warfare in the cyberspace has followed the same modus operandi. Data Breaches can be termed as the modern-day, digital invasions that have…