Security
-
Security threat caused by endpoint vulnerabilities.
By Vijay Bharti On 19 Sep 2014Sitting at the end of a network point or at any of the nodes of a corporate network, are countless PCs, laptops, smartphones, tablets or even equipment such as barcode readers and scanners. Each one of them is a security...
-
Security Information and Event Management (SIEM)
By Vijay Bharti On 12 Sep 2014Changing business conditions, newer threats, and a steep rise in the number of events, logs and alerts have made it imperative for organisations to rethink their IT strategies. Smart business architecture includes firewalls, intrusion prevention systems, intrusion detection systems, routers...
-
Secure Software Development Life cycle (S-SDLC)
By Raghuram Gorur On 9 Sep 2014It has been increasingly noticed, that software that is created with the aid of the conventional software development life cycle, tends to throw up a large number of security flaws. These defects can, in some cases, manifest themselves as serious...
-
Importance of Next Generation Firewall in Security Infrastructure.
By Vijay Bharti On 9 Sep 2014Appliances are proliferating. Thanks to shorter buying cycles, product that are easy to use (who cares about interoperability), and constant improvements based on user feedback. All these appliances end up on corporate networks with endpoint users, who chose to download...
-
The Internet of Things is Vulnerable!
By Kiran Veigas On 1 Sep 2014A recent study shows that 70% of devices connected to the Internet of Things used unencrypted network services to relay information. In the world of PCs and mobile devices, security is well addressed. But in the evolving world of the...
Tag Cloud
Subscribe for blog updates