by Binoy KL | Mar 21, 2013 | Data Protection, Information Security Leadership
Enterprise Information Security is receiving a lot of attention these days. Especially with the wide reach of media and Internet, Enterprise Information Security Incidents get maximum coverage in no time. Enterprises and government entities are under continuous attack...
by Binoy KL | Sep 30, 2012 | Cloud Security, Reports & Whitepapers
In the recent past CSA has defined the categories of security services that can be offered as Security as a Service. The functionalities listed in each category as part of the category definition is looked into in detail. The implementation guidance series tries to...
by Binoy KL | Sep 28, 2012 | Cloud Security, Reports & Whitepapers
The CSA (Cloud Security Alliance) has issued a new guideance with a focus on how security can be provided as a service (SecaaS). This document covers 10 categories of services that can be provided as a service over the cloud. An interesting quite from the executive...
by Binoy KL | Sep 28, 2012 | Data Protection
People and organizations dispose of their computers including the Hard drives when no more needed or considering that they are obsolete. The media such as hard drives, USB etc when disposed of may contain confidential information vital to you or your organization....
by Binoy KL | Aug 18, 2012 | Cloud Security
It is been considered that the cloud computing solutions reduces the cost of computing resources as far as organization is concerned. However, a recent white paper from ISACA indicates that the true cost of cloud computing may be higher than earlier thought values. In...
by Binoy KL | Aug 15, 2012 | Cloud Security
The number of organizations adopting clouding computing increases day by day. The COSO has published a thought paper on Enterprise Risk Management for Cloud Computing. In this paper, it provide guidelines on using the COSO Enterprise Risk Management . Integrated...
Recent Comments