by Binoy KL | Aug 22, 2012 | PCI DSS Compliance
The cardholder data breach is not a new thing. It is been a nightmare for every CIO in the world. Dancho Danchev’s blog has an interesting article on how these compromised cardholder data is turned into a physical card. He is profiling a rougue plastic card...
by Binoy KL | Aug 18, 2012 | Cloud Security
It is been considered that the cloud computing solutions reduces the cost of computing resources as far as organization is concerned. However, a recent white paper from ISACA indicates that the true cost of cloud computing may be higher than earlier thought values. In...
by Binoy KL | Aug 16, 2012 | Cyber Warfare
In the recent past, Middle Eastern companies are becoming a frequent target of attackers. Malware attack at the Saudi Aramco oil company is the latest in these series. News sources confirms that a malware infection at Saudi Aramco user workstations; however, the core...
by Binoy KL | Aug 16, 2012 | Cyber Warfare, Information Security Leadership
The recent power outage in the northern parts of India was part of a grid failure. However, it could have been a result of security failure as well. The security of these installations is considerably weak and such an attack would be hitting a much larger number of...
by Binoy KL | Aug 15, 2012 | Cloud Security
The number of organizations adopting clouding computing increases day by day. The COSO has published a thought paper on Enterprise Risk Management for Cloud Computing. In this paper, it provide guidelines on using the COSO Enterprise Risk Management . Integrated...
Recent Comments