by Binoy KL | Sep 28, 2012 | Data Protection
People and organizations dispose of their computers including the Hard drives when no more needed or considering that they are obsolete. The media such as hard drives, USB etc when disposed of may contain confidential information vital to you or your organization....
by Binoy KL | Jan 11, 2011 | Corporate Security
Building a comprehensive Information Security plan requires a detailed understanding of the business and the related requirements. An Information Security plan should ensure that the business requirements are captured and the related risks and controls are addressed...
by Binoy KL | Sep 26, 2010 | Data Protection
Survey finds security breaches due to social networking more pressing than everA new survey from email security firm Proofpoint finds more organisations are dealing with data loss and security breaches due to employee use of social media sites. Proofpoint polled 261...
by Binoy KL | Jan 19, 2010 | Data Protection
Data leakage is a key threat which could give sleepless nights for any business executive and is definitely on the top priority of the CISO’s and information security managers.I have looked into the DLP scenario’s and various solutions. I have not found a...
by Binoy KL | Mar 18, 2008 | Phishing
Sid Stamm, Zulfikar Ramzan, and Markus Jakobsson have identified a clever, and potentially devastating, attack against home/wireless routers. How does the attack works? Attacker creates a webpage with containing the malicious Javascript code. Victim visits the page...
Recent Comments