Phishing is a very common means of social engineering in these days. Despite the increased efforts by Banks and other...
Cloud backup service . Risk and rewards
Cloud based services are on the rise. One of the service offered by a vendor is that it allows you to backup your data...
Information Security predictions for 2012
Security vendors and information security experts across the world publishes their predictions on the upcoming...
Information Security Risk Assessments
Information security risk assessment is an integral process in developing an effective information security management...
Data Loss Prevention best practices
Data Loss Vectors Insider threat being one among the top ten threats an organization faces, data loss prevention...
Data Loss Prevention Solutions worth evaluating
12Content Aware DLP Solutions worth evaluating Data loss prevention is being considered as one among the key...
Data loss prevention
Businesses are driven by data. Global organizations need more than network security to protect their...
Cloud computing and Data security
Cloud computing is becoming a real trend in today.s business world. Businesses are increasingly opting for cloud based...
10 resolutions for New Year 2012
All of us take resolutions in the new year. What is followed and what will be left out are points of discussion beyond...
IT Risk Management
Risk Management is a key term we keep discussing every now and then when we talk about information security. It often...
Disk Space attacks
Disk space attacks are a form of resource utilization attacks resulting in denial of service. Disk space if a finite...
Stratfor Incident.An analysis
Stratfor, a global security think-tank, is hacked and now everyone knows about it. Based on the information available...
Importance of Database Activity Monitoring
Database Activity Monitoring is a key process in the data protection suite of activities. Databases being the key...
10 Vulnerable web applications for security testing
In this post I am listing a set of vulnerable web applications publicly made available for the purpose of security...
Burp Tools for Web Application Security
Web Application Security testing is a specialized process in security testing and Burp Suite of tools provides a set...
Database Activity Monitoring
Who has unlimited access to your data? None other than the database administrators. We do trust them, don.t we? Yep,...
NIST Guide for Conducting Risk Assessments
NIST has updated the Guide for Conducting Risk Assessments (NIST Special Publication 800-30) to a great extent and the...
A study about the SQL injection attacks
Imperva has released a report on the anatomy of the SQL injection attacks. Well, its not much about the anatomy, but...
New guidance on risk appetite
Risk appetite today is a core consideration in any enterprise risk management approach. As well as meeting the...
Data Protection and the Cloud
CA Technologies commissioned independent research in May 2011 to investigate the data protection and disaster recovery...