by Binoy KL | Aug 18, 2012 | Cloud Security
It is been considered that the cloud computing solutions reduces the cost of computing resources as far as organization is concerned. However, a recent white paper from ISACA indicates that the true cost of cloud computing may be higher than earlier thought values. In...
by Binoy KL | Aug 16, 2012 | Cyber Warfare
In the recent past, Middle Eastern companies are becoming a frequent target of attackers. Malware attack at the Saudi Aramco oil company is the latest in these series. News sources confirms that a malware infection at Saudi Aramco user workstations; however, the core...
by Binoy KL | Aug 16, 2012 | Cyber Warfare, Information Security Leadership
The recent power outage in the northern parts of India was part of a grid failure. However, it could have been a result of security failure as well. The security of these installations is considerably weak and such an attack would be hitting a much larger number of...
by Binoy KL | Aug 15, 2012 | Cloud Security
The number of organizations adopting clouding computing increases day by day. The COSO has published a thought paper on Enterprise Risk Management for Cloud Computing. In this paper, it provide guidelines on using the COSO Enterprise Risk Management . Integrated...
by Binoy KL | Aug 14, 2012 | Assessment Tools, Security Tools
Backtrack developers had released a new version of the backtrack penetration testing live CD / VMware version yesterday. This version adds a number of tools in addition to the bugfixes, several of which were released in BlackHat and Defcon 2012. A whole new tool...
by Binoy KL | Aug 14, 2012 | Corporate Security, Incident Management, Standards & Compliance
NIST has published the final version of their guide on Computer Security Incident Handling. This guide is built based on the best practices adopted by governments, other non-commercial organizations and business organizations. This version emphasise the importance of...
by Binoy KL | May 29, 2012 | Cyber Warfare
Kaspersky Labs announced its new finding on the cyber warfare space, FLAME, indicating that the cyberwar landscape is taking new dimensions. The new malware named Flame is located in the Middle Eastern region primarily Iran. The below image from Kaspersky blog...
by Binoy KL | May 3, 2012 | Protection Tools
Checkpoint is getting into the Free Antivirus game by offering its ZoneAlarm antivirus software as a free consumer product for the first time, adding the company’s no-cost firewall to the bundle to offer all-in-one PC protection. The following features are built...
by Binoy KL | Apr 12, 2012 | Corporate Security, PCI DSS Compliance, Standards & Compliance
Many information security professionals, event at the senior level roles, are still getting the internal control mechanisms such as Dual Control and Segregation of duties wrong. I often see that they are confused between the concepts of Dual Control and Segregation of...
by Binoy KL | Apr 8, 2012 | Uncategorized
In the initial days, attacks were focused on the network and operating system vulnerabilities. We have seen many such attacks resulting in network unavailability, information disclosure, denial of service etc… However, such attacks were not providing much direct...
Recent Comments