NSA is accused to be spying on the people for years. In a recent article, NewYork Times describes the strategies by NSA on the exploitation of the implementation flaws in some…
Enterprise Information Security is receiving a lot of attention these days. Especially with the wide reach of media and Internet, Enterprise Information Security Incidents get maximum coverage in no time.…
People and organizations dispose of their computers including the Hard drives when no more needed or considering that they are obsolete. The media such as hard drives, USB etc when…
Security breaches are become a common thing these days. They hit the front page only when the size or importance of the breach become huge. The recent security breach at…
Many a times when considering cost reduction, Information security outsourcing often come up for discussions. Can we outsource information security effectively? Can it be as good as outsourcing the software…
Advanced persistent threat has made headlines when it hit big names like SONY, Symantec, RSA etc. APT is a stream of cyber crime with a focus on specific entities. This…
Data Loss Vectors Insider threat being one among the top ten threats an organization faces, data loss prevention mechanisms play a key role in protecting the data within an organization.…
12Content Aware DLP Solutions worth evaluating Data loss prevention is being considered as one among the key information security tools an enterprise needs. Here is a list of software vendors…
Businesses are driven by data. Global organizations need more than network security to protect their confidential data and sensitive information.The protection of data itself is equally important. In any organization,…
Cloud computing is becoming a real trend in today.s business world. Businesses are increasingly opting for cloud based applications for their business needs. Various security aspects need to be assessed…