22.1 C
Bengaluru

Data Protection

Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for communications while serving the State department. It is reported that Clinton used...
It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war than anything else. We see a lot of such incidents these days including...

Global Payments breach.initial review

Security breaches are become a common thing these days. They hit the front page only when the size or importance of the breach become...

Outsourcing Information Security

Many a times when considering cost reduction, Information security outsourcing often come up for discussions. Can we outsource information security effectively? Can it be...

Advanced Persistent Threat (APT)

Advanced persistent threat has made headlines when it hit big names like SONY, Symantec, RSA etc. APT is a stream of cyber crime with...

Data Loss Prevention best practices

Data Loss Vectors Insider threat being one among the top ten threats an organization faces, data loss prevention mechanisms play a key role...

Data Loss Prevention Solutions worth evaluating

12Content Aware DLP Solutions worth evaluating Data loss prevention is being considered as one among the key information security tools an enterprise needs....

Data loss prevention

Businesses are driven by data. Global organizations need  more than network security to protect their confidential data and sensitive information.The protection of data itself...

Cloud computing and Data security

Cloud computing is becoming a real trend in today.s business world. Businesses are increasingly opting for cloud based applications for their business needs. Various...

Stratfor Incident.An analysis

Stratfor, a global security think-tank, is hacked and now everyone knows about it. Based on the information available on the web related to this...

Importance of Database Activity Monitoring

Database Activity Monitoring is a key process in the data protection suite of activities. Databases being the key place for data storage, database activity...

Database Activity Monitoring

Who has unlimited access to your data? None other than the database administrators. We do trust them, don.t we? Yep, what else we can...

Sega says hackers stole data of 1.29 million users

Sega has confirmed that the personal data of 1.29 million of its customers was stolen in an attack on its systems. It comes after...

Top security predictions 2011-2012

Security predictions are part of the year end routines of many security solutions and services companies as well as key security personals. In this post,...

Recent articles