Security
-
Holistic Approach to Security & Compliance in the Cloud
By Raju Chellaton On 7 May 2015Ever since the popular information breach of Target in 2013, the imperative need for enterprises the world over to enable a holistic information security architecture has become top priority. That being said, even today, security and information today, for many...
Access Governance Cloud Governance & Risk Compliance Identity & Access Governance Security
-
Cyber Threat Intelligence – What is needed?
By Haren Bhatt On 6 Apr 2015Cyber Threat Intelligence (CTI) is a term used to address any kind of information that protects your organization's IT assets from potential security impeachment. CTI can take many forms. It could be internet based IP addresses or geo locations TTP's...
-
Internet of Things – Security: What, Why and How
By Subhash Nukala On 31 Mar 2015By definition Internet of Things (IoT) is: A proposed development of the internet in which everyday objects have network connectivity, allowing them to send and receive data. Telephones, automobiles, refrigerators and seemingly anything that can host a computer chip are...
-
The Importance of Black Box Testing
By Manoj Rai On 2 Mar 2015When testing software, it's necessary to employ a methodology that's as free from bias as possible. Development can be easily influenced by giving the tester too much information about the development process itself. The best-case scenario is that the tester...
-
Combating Cybersecurity Threats through Risk Assessment and Compliance
By Vijay Bharti On 23 Feb 2015Technologies are evolving, getting complex by the day; so are cyber security risks. Businesses operating in an interconnected, digital world are wholly dependent on technology to drive profitability, and thus need to be aware of imminent threats in the technology...
Tag Cloud
Subscribe for blog updates