Security
-
Identity and Access Management Tips For Security Professionals
By Prasenjit saha On 24 Mar 2016The last two years have witnessed a slew of mega breaches and security hacks worldwide. While much ado has been made about cyber-security in the wake of these crippling attacks, the truth remains that security within the organization is equally...
-
Tips to Choosing The Right Enterprise Security Vendor
By Raghuram Gorur On 2 Mar 2016The stakes are high indeed when it comes to enterprise security. A single breach can have a plethora of effect on a company, resulting in financial and reputational damage. The hard fact is that enterprise security is something we cannot...
Cloud Services Cyber Security Cyber Threat Intelligence Identity & Access Governance Infrastructure Security
-
Disruptive Technologies Pose Challenge to Network Security
By hmblog On 2 Mar 2016Security has always remained a major concern for organisations across verticals. Organizations worldwide have ranked IT security as one of their priorities as increasingly sophisticated attacks, new data protection regulations, and most recently insider fraud and data breaches, threaten to...
Disruptive Technology Infrastructure IoT Security Technology
-
Best Security Practices in IT Infrastructure Implementation
By Prasenjit saha On 18 Feb 2016The structure of IT infrastructure is changing and with it, its security aspects. Gartner in its ‘Top Predictions for IT Organizations and Users for 2016 and Beyond’ [1] reveals, ‘By 2018, 50 percent of enterprises with more than 1,000 users...
Access Governance Identity & Access Governance Infrastructure Security
-
Of Honeypots, Decoys and Red Herrings
By Manoj Rai On 9 Feb 2016A look at cyber- threats The number of apps on your phone is directly proportional to how tech-savvy you can be. Ask any millennial and they will “app” a problem for you. Want to find your lost keys? Want to...
Cyber Security Cyber Threat Intelligence Security Threat Management
Tag Cloud
Subscribe for blog updates