Digital Transformation Blogs - Bigdata, IoT, M2M, Mobility, Cloud

Security

How Do You Solve a Problem Like Cyber Security?

Happiest Minds UK discusses the new-age deception technologies UK businesses should adopt to bolster their cyber-security defences The recent TalkTalk cyber-security breach has brought the issue of security firmly back into the public’s psyche and has put both government and organisations on high alert. It seems that regardless of your vertical market, be it finance, […]
Read Now

Key Security Tactics to Help Protect Your Business from a TalkTalk hack

Isaac George, SVP & regional head of digital transformation company Happiest Minds UK, discusses the increased number of security threats UK organisations are exposed to following the TalkTalk hack. Cyber crimes are not only occurring with mounting frequency in today’s wireless world, but they are also becoming increasingly sophisticated and widespread. Just this month, major […]
Read Now

How to Protect Your Data from Third-Party Breaches

The December 2013 Target data breach that compromised the credit card information of 40 million customers was the first of many wake-up calls to organizations, bringing home the damage a company can sustain when a partner’s systems are hacked. As the whole world now knows, the HVAC supplier had access to more of Target’s systems than was needed […]
Read Now

Disruptive Technology Weekly Roundup – Sep 10th to Sep 15th

Adopting disruptive technologies is easier said than done for conventional enterprises. But what if their business models are compatible to disrupt the disruption? Survivors are companies who are willing to risk their existence and disrupt themselves! Disruptive technologies are meant to amend how companies operate in future. While disruption can bring great competition to the […]
Read Now

How SIEM Systems can Improve the Detection of Events of Interest

Currently, enterprise awareness on cyber threats is high, and organizations are investing considerably in security solutions and the latest security tools. Nonetheless, the rising incidence of high-profile and successful attacks clearly demonstrate the need for more effective threat detection and management of cyber threats. The primary reason that many solutions remain ineffectual against emerging threats […]
Read Now

The High Cost of False Positives to an Organization

Cyber security teams are under tremendous pressure to safeguard their IT infrastructure and business data against the escalating threat of breaches. Even as organizations increasingly look to automated security tools to deal with threats, the downside to these cannot be ignored—for they generate a high number of false positives. A false positive is a false […]
Read Now

The Growing Need For Enterprise Security

The coverage of enterprise security is constantly being redefined on account of globalization and blurring boundaries of Big Data. However, on a broad level, it still comprises of the four key disciplines of information security, business security, physical security and operational risk management.  According to estimates from Gartner, the information security spending is expected to […]
Read Now

Get Connected with the Internet of Things

The ‘Internet of Things‘ has created a lot of interest and hype over the recent few years. Declining device costs, widely deployed IP networks, and new regulatory mandates are fueling its importance. More than nine billion devices around the world are currently connected to the Internet, including computers and smartphones. That number is expected to […]
Read Now
Identity and Access Management

The Foolproof Penetration Testing Checklist

Penetration testing, or pen testing as it is popularly called, is a critical component of any Threat Management Solution. It is now increasingly accepted as an effective method of detecting vulnerabilities in your network, applications and infrastructure. In a pen test, the tester deploys various malicious methodologies to deliberately attack your system, in order to […]
Read Now

Archives

Categories