Security
-
Prevent Vulnerabilities With Adequate Testing
By Khaleel Syed On 21 Feb 2014Managing risks and information security is one of the key aspects of any organization, particularly for those dealing with sensitive and confidential information. Any breach or attack can not only cause them harm from a business perspective but also create...
-
Penetration testing – do’s and don’ts
By Khaleel Syed On 19 Feb 2014Organizations invest heavily into security programs with the latest solutions and infrastructures; however, without testing there is no way to determine their effectiveness in case of an attack. Taking the most recent BBC example, where they had a server hacked...
-
Defending Malicious Attacks Through A Secure Platform
By Khaleel Syed On 12 Feb 2014Information is the lifeblood of global economy and any organization today is riding on this wild horse that is always threatened by security risks. As enterprises grapple with volumes of unstructured data through multifarious channels, the risks to information security...
-
Re-examine your Password Management solution
By Subhash Nukala On 14 Jan 2014Today's organizations are a study in change: New employees and contractors come on board, some leave, others transfer, while responsibilities continuously shift within the organization. Throughout all this change, password policies continue to enforce password changes, prompting endless calls to...
-
The top 5 things you need to know about Access Governance
By Subhash Nukala On 14 Jan 2014The growing importance that Access Governance is gaining in the IT industry goes to show how organizations are focusing on regulatory compliance and the like. A rising awareness to security threat and a heightened concern for overall IT security makes...
Tag Cloud
Subscribe for blog updates