Crossbow Labs

Uncategorized

Is Your Bluetooth Vulnerable ? – A quick read on Bluesnarfing attacks

Back in the 90’s, when Bluetooth entered the market as a disruptive wireless technology and revolutionized the way we exchange data, it was apparent that the exploiting attacks will soon follow to intercept communication and steal data. In 2003, Adam Laurie (A.L. Digital) discovered the security vulnerabilities in the Bluetooth devices for the first time, …

Is Your Bluetooth Vulnerable ? – A quick read on Bluesnarfing attacks Read More »

Banking upon Blockchain for Cybersecurity

Muruganandam Manickam heads cybersecurity governance and threat management at one of the leading banks in Middle East Asia. He has over two decades of experience spanning information security, governance, business continuity, and risk management services. Here he discusses in detail, the utilization of blockchain in the banking sector and its implementation for minding cybersecurity.

Managing Crisis in Conglomerates

Jeevan Badigari is the IT Security & Governance Manager at Majid Al Futtaim. He has got multiple certifications and multi-skilled professional and personal experiences. Here he discusses in detail, the endeavors a conglomerate like MAF undertakes to withstand the pandemic.

Cloud Adoption & BFSI

Swati Anuj Arya is a  Financial Services Compliance Specialist with one of the leading cloud service providers in the world. She helps many organizations across India in fulfilling their compliance requirements either pertaining to industry standards or regional regulations. Here she discusses in detail how the BFSI sector can adopt cloud platforms and address the …

Cloud Adoption & BFSI Read More »

Password & Psychology

As Abhiramalakshmi Karthikeyan makes her second appearance on our podcast, she not only talks about passwords but the human psychology behind creating and keeping the passwords. Here, she also discusses how technology can help in hovering strong passwords.