Indu Krishna

Associate Data Analyst, Research and Innovation

Indu is an Associate Data Analyst at Security Quotient, specializing in Cyber Security and Behavior Analytics. She stepped into this role in October 2023, right after earning her Master’s degree in Computational Linguistics. Indu is passionate about exploring new cyber security and data science frontiers and is determined to grow within her role. In her work, Indu focuses on transforming raw data into clear, actionable insights and visually compelling stories. However, her contributions extend beyond the analysis space into contributing significantly to Security Quotient’s web presence by writing insightful blog articles and case studies. Her work demonstrates how cyber security data analytics underpin the defense against digital vulnerabilities.

Articles authored by Indu Krishna
Monthly Threat Intelligence Insights–March

Threat Intelligence

Monthly Threat Intelligence Insights: March 2025

March 2025 witnessed a continued rise in cyber threats, with a strong uptick in ransomware campaigns, phishing attacks, social engineering … Read more

Monthly Threat Intelligence Insights-February

Threat Intelligence

Monthly Threat Intelligence Insights: February 2025

February 2025 saw a rise in cyber threats, with malware, phishing, ransomware, and social engineering attacks causing major disruptions. Attackers … Read more

Monthly Threat Intelligence Insights-January

Threat Intelligence

Monthly Threat Intelligence Insights: January 2025

January 2025 saw a sharp rise in AI-driven cyber attacks, advanced phishing scams, and ransomware outbreaks. The healthcare, finance, and … Read more

special-product-photography-studio

Threat Intelligence

Google Ads Scam: Attackers are Stealing Accounts

Key Insights Cyber criminals are running a scam targeting Google Ads users. They create fake Google Ads login pages. When … Read more

HowCanEmployeesMinimizeHumanErrorinSMEsInformationSecurity

Compliance for SMEs

How Can Employees Minimize Human Error in SMEs’ Information Security?

Table of Contents Who should read this? SME Employees, Team Leads From sending sensitive data to the wrong recipient to … Read more

HowCanSMEsAlignTheirEmployeesToAchieveInformationSecurityObjectives

Compliance for SMEs

How Can SMEs Align Their Employees To Achieve Information Security Objectives?

Table of Contents Who should read this? Small and Medium Business Owners, Managers, or Security Officers Employees are the backbone … Read more

setting_information_security_objectives_tips_for_smes

Compliance for SMEs

How Can SMEs Set Information Security Objectives with Ease?

Table of Contents Who should read this? Small and Medium Business Owners, IT personnel, Managers, or Security Officers Have you … Read more

how_to_align_security_objectives_with_business_goals_insights_for_smes

Compliance for SMEs

How to Align Security Objectives with Business Goals: Insights for SMEs

Table of Contents Who should read this? Small and Medium Business Owners, Managers and Team Leaders According to the World … Read more

role_of_leadership_in_smes_cyber security_compliance_journey_2

Compliance for SMEs

Role of Leadership in SME’s Cyber Security Compliance Journey

Table of Contents Who should read this? Small and Medium Business Owners You might think your SME is too small … Read more

Compliance for SMEs

Why Compliance Gap Assessments Matter for SMEs?

Table of Contents Who should read this? Small Business Owners, Managers and Team Leaders Wondering what compliance standards your business … Read more

Talk to us

Pick a Time Slot
A customer success team member at work.