Security
-
M2M/ IoT Protocols: An Introduction
By Shanmugasundaram M On 3 Feb 2016M2M and IoT are taking the world by storm. The things around us are becoming smarter, intelligent, seamlessly connected and interacting with each other. However, the real question is what language or protocol does all these devices will communicate with...
-
Network Security: A Key Imperative
By Raghuram Gorur On 20 Jan 2016Network security refers to the set of activities or measures taken to protect your office/ company network and ensure network threat management and remediation. Network security ensures that a network is protected while sending, receiving and storing data and identifies...
Access Governance Cyber Security Infrastructure Security Threat Management
-
-
Staying Afloat During a Cyber-Attack
By Raghuram Gorur On 20 Jan 2016Given the rising frequency of increasingly malicious and innovative cyber-attacks, one can safely conclude that cyber risk is here to stay. It is no longer a question of ‘if’ but ‘when’ your organization will have to deal with a cyber-attack....
Cyber Security Cyber Threat Intelligence Infrastructure Security
-
Components of Agile Infrastructure
By Raghuram Gorur On 20 Jan 2016The debate on whether the Agile principles that have been making waves in software development can be applied to infrastructure continues even as enterprises adopt and reap the benefits of implementing Agile methodologies to boost their infrastructure. Though the inherent...
Tag Cloud
Subscribe for blog updates