Security
-
The High Cost of False Positives to an Organization
By Vijay Bharti On 17 Aug 2015Cyber security teams are under tremendous pressure to safeguard their IT infrastructure and business data against the escalating threat of breaches. Even as organizations increasingly look to automated security tools to deal with threats, the downside to these cannot be...
-
The Growing Need For Enterprise Security
By Prasenjit saha On 21 Jul 2015The coverage of enterprise security is constantly being redefined on account of globalization and blurring boundaries of Big Data. However, on a broad level, it still comprises of the four key disciplines of information security, business security, physical security and...
-
5 Reasons Why Your Pen Test Should Combine Manual and Automated Testing
By Manoj Rai On 21 May 2015When it comes to penetration testing, there are any number of automated tools available in the marketplaceāboth the high-priced sophisticated lot, and their inexpensive counterparts that are just about adequate. However, the ideal pen test is more than just a...
-
Get Connected with the Internet of Things
By Kiran Veigas On 15 May 2015The 'Internet of Things' has created a lot of interest and hype over the recent few years. Declining device costs, widely deployed IP networks, and new regulatory mandates are fueling its importance. More than nine billion devices around the world...
-
The Foolproof Penetration Testing Checklist
By Manoj Rai On 11 May 2015Penetration testing, or pen testing as it is popularly called, is a critical component of any Threat Management Solution. It is now increasingly accepted as an effective method of detecting vulnerabilities in your network, applications and infrastructure. In a pen...
Tag Cloud
Subscribe for blog updates