-
Vulnerability Management in an Application Security World
By Khaleel Syed On 26 Feb 2014Identification, assessment and reporting of security vulnerabilities in applications, databases, systems, networks and perimeters is the first step towards information security management to adhere with organizational policy, client requirements and applicable regulatory & legislative requirements. But with companies deploying more...
-
Prevent Vulnerabilities With Adequate Testing
By Khaleel Syed On 21 Feb 2014Managing risks and information security is one of the key aspects of any organization, particularly for those dealing with sensitive and confidential information. Any breach or attack can not only cause them harm from a business perspective but also create...
-
Penetration testing – do’s and don’ts
By Khaleel Syed On 19 Feb 2014Organizations invest heavily into security programs with the latest solutions and infrastructures; however, without testing there is no way to determine their effectiveness in case of an attack. Taking the most recent BBC example, where they had a server hacked...
-
Defending Malicious Attacks Through A Secure Platform
By Khaleel Syed On 12 Feb 2014Information is the lifeblood of global economy and any organization today is riding on this wild horse that is always threatened by security risks. As enterprises grapple with volumes of unstructured data through multifarious channels, the risks to information security...
Tag Cloud
Subscribe for blog updates