Select Page

List of Disk wipe software

People and organizations dispose of their computers including the Hard drives when no more needed or considering that they are obsolete. The media such as hard drives, USB etc when disposed of may contain confidential information vital to you or your organization....

Outsourcing Information Security

Many a times when considering cost reduction, Information security outsourcing often come up for discussions. Can we outsource information security effectively? Can it be as good as outsourcing the software development or business processing? Does it introduce any...

Advanced Persistent Threat (APT)

Advanced persistent threat has made headlines when it hit big names like SONY, Symantec, RSA etc. APT is a stream of cyber crime with a focus on specific entities. This focus makes it different from other types of attacks. APT threats are focused on specific targets...

Data Loss Prevention best practices

Data Loss Vectors Insider threat being one among the top ten threats an organization faces, data loss prevention mechanisms play a key role in protecting the data within an organization. With all the avenues available to employees today to electronically expose...