Get Started

Webinar on Infosec Compliance in SaaS

SaaS Founders – We heard you!
Catch our Captain Manoj Kumar Shastrula & International speaker Narasimhan Elangovan decoding InfoSec Compliance for SaaS companies.

Click below to register

Hurry up as limited slots are available, for making the webinar efficient.

Uncategorized for Singapore – Presenting at Cyber Security World, Asia, Marina Bay Sands this October 12-13.

Cyber Security World, Singapore, Asia’s most exciting cybersecurity event on 12th – 13th October 2022 for its 8th edition at Marina Bay Sands, Singapore.

The award-winning event connects cybersecurity professionals and business leaders with experts, solutions, and services to help accelerate digital transformation plans. is excited to announce “ for Singapore” at the event. We shall be presenting at stall E-4 for 2 days. Our Captain Manoj Kumar Shastrula is also a distinguished speaker at the event on “Business Value of Security without Attestations is ZERO”.

The CyberSec event is a great place to look at 500+ innovative solutions. And we, with one of the most unique solutions at the event, are sure to be a show-stopper. Come, learn about Security and Data Compliance and how can we help you. Tech Week in Singapore is live with one of the biggest events happening at Marina Bay Sands this October 12-13. It’s a culmination of 7 events namely ” write the list”Looking forward to seeing you there.


Uncategorized is named “Tech Startup of the Year-Security” by the prestigious The Entrepreneur. is named as “Tech Startup of the Year-Security” at the prestigious  Entrepreneur Awards 2022 held at J.W. Mariott, Aerocity, Delhi.

For a 14-month old startup, this is a big feather to have in its cap so early in its journey.

This award is a testament to our underlying passion to disrupt the entire compliance industry and build a brand that stands on accuracy on real time – as we aspire to become mavericks of automated Security Compliance in years to come.

Shout out to the entire team of for their relentless passion. This is for everyone who played a part in our journey.


Entrepreneur Annual Conclave 2022

Entrepreneur Annual Conclave 2022 is the flagship annual event of Entrepreneur Media which will be held on 20th-21st September. It is the final destination for entrepreneurs, investors, disruptors and innovators where they discuss, debate and dissect what the future holds in a vibrant atmosphere. In its Ninth Edition, Entrepreneur Media brings together the Movers and Shakers of India and Asia Pacific.

Entrepreneur India is a monthly business magazine targeted at Indian business owners and entrepreneurial enthusiasts. It is published by Entrepreneur India Media Pvt. Ltd., a joint venture between Entrepreneur Media, USA’s business magazine for entrepreneurs, and Franchise India, an Indian company providing integrated franchise solutions since 1999 in various Asian countries. Entrepreneur India Media publishes the Entrepreneur magazine in India, as well as hosting the Entrepreneur website in the country.

The magazine was relaunched in India in July 2015 by Entrepreneur India Media for Indian readers interested in business and entrepreneurial stories and information.

Below are the major publications of Entrepreneur India Magazine

Catch up with the team of at the stall No(E6)

Route Map –


Beneath the surface of a cyberattack: Collision avoidance

The business application of cyber risk quantification

Figure 1.

Fourteen cyber breach impact factors Above the surface better-known cyber incident costs Technical investigation Citizen or customer breach notification Post-breach citizen or customer protection Regulatory compliance Public relations Attorney fees and litigation Cybersecurity improvements Insurance premium increases Increased cost to raise debt Impact of operational disruption or destruction Lost value of customer relationships Value of lost contract revenue Devaluation of trade name Loss of intellectual property National security / impact to the economy1


Instagram fined €405m over children’s data privacy

The long-running complaint concerned children’s data – particularly their phone numbers and email addresses.

Some reportedly upgraded to business accounts to access analytics tools such as profile visits, without realising this made more of their data public.

Instagram’s owner, Meta, said it planned to appeal against the decision. It is the third fine handed to the company by the regulator.

“We adopted our final decision last Friday and it does contain a fine of €405m [£349m],” Ireland’s Data Protection Commissioner (DPC) said.

‘Engaged fully’

A Meta official told BBC News: “This inquiry focused on old settings that we updated over a year ago and we’ve since released many new features to help keep teens safe and their information private.


“Anyone under 18 automatically has their account set to private when they join Instagram, so only people they know can see what they post and adults can’t message teens who don’t follow them.

“While we’ve engaged fully with the DPC throughout their inquiry, we disagree with how this fine was calculated and intend to appeal it.

“We’re continuing to carefully review the rest of the decision.”

‘Major breach’

The DPC regulates large technology companies with European headquarters in the Republic of Ireland.

It has never given such a large fine for a breach of the European Union’s General Data Protection Regulation.

But last year, it fined WhatsApp €225m, while Luxembourg’s data authority fined Amazon a record €746m.


National Society for the Prevention of Cruelty to Children (NSPCC) child-safety-online policy head Andy Burrows said of Instagram’s fine: “This was a major breach that had significant safeguarding implications and the potential to cause real harm to children using Instagram.

“The ruling demonstrates how effective enforcement can protect children on social media and underlines how regulation is already making children safer online.

“It’s now over to the new prime minister to keep the promise to give children the strongest possible protections by delivering the Online Safety Bill in full and without delay.”


Incident Report: Employee and Customer Account Compromise

Twilio believes that the security of our customers’ data is of paramount importance, and when an incident occurs that might threaten that security, we communicate what happened in a transparent manner. To that end, we are providing an overview of this incident impacting customer information and our response.

What happened?

On August 4, 2022, Twilio became aware of unauthorized access to information related to a limited number of Twilio customer accounts through a sophisticated social engineering attack designed to steal employee credentials. This broad based attack against our employee base succeeded in fooling some employees into providing their credentials. The attackers then used the stolen credentials to gain access to some of our internal systems, where they were able to access certain customer data. We continue to notify and are working directly with customers who were affected by this incident. We are still early in our investigation, which is ongoing.

More specifically, current and former employees recently reported receiving text messages purporting to be from our IT department. Typical text bodies suggested that the employee’s passwords had expired, or that their schedule had changed, and that they needed to log in to a URL the attacker controls. The URLs used words including “Twilio,” “Okta,” and “SSO” to try and trick users to click on a link taking them to a landing page that impersonated Twilio’s sign-in page. The text messages originated from U.S. carrier networks. We worked with the U.S. carriers to shut down the actors and worked with the hosting providers serving the malicious URLs to shut those accounts down. Additionally, the threat actors seemed to have sophisticated abilities to match employee names from sources with their phone numbers.

Sample SMS phishing messages:

example phishing message 1example phishing message

We have heard from other companies that they, too, were subject to similar attacks, and have coordinated our response to the threat actors – including collaborating with carriers to stop the malicious messages, as well as their registrars and hosting providers to shut down the malicious URLs. Despite this response, the threat actors have continued to rotate through carriers and hosting providers to resume their attacks.

Based on these factors, we have reason to believe the threat actors are well-organized, sophisticated and methodical in their actions. We have not yet identified the specific threat actors at work here, but have liaised with law enforcement in our efforts. Socially engineered attacks are — by their very nature — complex, advanced, and built to challenge even the most advanced defenses.

What have we done?

Once Twilio confirmed the incident, our security team revoked access to the compromised employee accounts to mitigate the attack. A leading forensics firm was engaged to aid our ongoing investigation.

We have reemphasized our security training to ensure employees are on high alert for social engineering attacks, and have issued security advisories on the specific tactics being utilized by malicious actors since they first started to appear several weeks ago. We have also instituted additional mandatory awareness training on social engineering attacks in recent weeks. Separately, we are examining additional technical precautions as the investigation progresses.

As the threat actors were able to access a limited number of accounts’ data, we have been notifying the affected customers on an individual basis with the details. If you are not contacted by Twilio, then it means we have no evidence that your account was impacted by this attack.

Trust is paramount at Twilio, and, we know the security of our systems is an important part of earning and keeping your trust. We sincerely apologize that this happened. While we maintain a well-staffed security team using modern and sophisticated threat detection and deterrence measures, it pains us to have to write this note. We will of course perform an extensive post-mortem on this incident and begin instituting betterments to address the root causes of the compromise immediately. We thank you for your business, and are here to help impacted customers in every way possible.

Next steps

The Twilio Security Incident Response Team will post additional updates here if there are any changes. Also note that Twilio will never ask for your password or ask you to provide two-factor authentication information anywhere other than through the portal.




Status Update – August 10, 2022

As a follow-up to our communication regarding the ongoing social-engineering phishing scam that has targeted numerous companies recently, Twilio is continuing its investigation. Security and trust are our top priority as we gather more information. At this time, we can share the following updates:

  • We have identified approximately 125 Twilio customers whose data was accessed by malicious actors for a limited period of time, and we have notified all of them
  • There is no evidence that customer passwords, authentication tokens, or API keys were accessed without authorization

Our information security team has been working diligently to share details about the attack with impacted customers. If a customer has not been contacted by Twilio, then it means that there is no evidence that their account was impacted by this attack. Our investigation is still ongoing, and if we identify any additional customers that were impacted, our information security team will reach out to them directly. Due to the ongoing and sensitive nature of the investigation, we are not providing further details publicly.

The malicious actors continue to launch social-engineering attacks. However, we have instituted a number of additional measures internally to protect against these attacks, including hardening our security controls at multiple layers.

We are very disappointed and frustrated about this incident. Trust is paramount at Twilio, and we recognize that the security of our systems and network is an important part of earning and keeping our customers’ trust. We are committed to learning from this incident and continuing to improve our processes.

We will maintain continuous communication with impacted customers as we move forward with our investigation.




Status Update – August 24, 2022

As we are continuing our investigation and gathering more information, we can share the following update:

After having instituted a number of targeted security enhancements internally, we have not observed any additional instances of unauthorized access to accounts since our last update.

To date, our investigation has identified 163 Twilio customers – out of a total customer base of over 270,000 – whose data was accessed without authorization for a limited period of time, and we have notified all of them.

In addition, to date, our investigation has identified that the malicious actors gained access to the accounts of 93 individual Authy users – out of a total of approximately 75 million users – and registered additional devices to their accounts. We have since identified and removed unauthorized devices from these Authy accounts. Twilio purchased Authy in 2015 and various elements of Twilio’s platform support the functionality of Authy.

We have contacted the 93 Authy users and provided them with additional guidance to protect their account, based on industry-accepted practices:

  • Review any linked account(s) for suspicious activity and work with their account provider(s) if they have any concerns.
  • Review all devices tied to their Authy account and remove any additional devices they don’t recognize.
  • To prevent the addition of unauthorized devices, we recommend that users add a backup device and disable “Allow Multi-device” in the Authy application. Users can re-enable “Allow Multi-device” to add new devices at any time. Specific steps can be found here.

Trust is paramount at Twilio, and we recognize that the security of our systems and network is an important part of earning and keeping our customers’ trust. As we continue our investigation, we are communicating with impacted customers to share information and assist in their own investigations. We will update this blog with more information as it becomes available.

Get started with
Automate your compliance