1. Internet access monitoring (use free tools available on android/appstore)In order for children to start using the Internet they must be under the care of an adult. It is not a matter of violating privacy by spying on what they do, but of…
Are We Stuck With the Four-Box Problem?
I don't think so. CloudOps will likely add more traditional security functions, like incident response, making all things related to cloud infrastructure management centralized under one independent function.…
"1) District wise, state wise, Seismic zone wise employee population analysis is important.
2) Historical Situations arising due to power issues, internet issues, natural calamities and political issues to be collected and impact analysis to be done…"
"Hello wonderful team, I would like to nominate myself - https://www.linkedin.com/in/shamane/
Shamane Tan, Chief Growth Officer, Author and TEDx Speaker:
Shamane Tan works with C-Suite and executives on managing cyber risk as part of their business…"
"VKYC completely revolves on Confidentiality, Integrity, Availability & Authorisation.
How you capture the date and store the date - device security
Can it be tamper proof ?
Have Audit Controls for data movement
How the process undergoes multiple…"
"10% of what? Workforce of what? Maturity of what? A fundamental issue is that since "cybersecurity" has come into vogue as its own creation different than "information security" - as defined by NIST CSF and regulatory bodies (such as NY DFS),…"
"I agree with Mr.Anoop. We use the Mac binding for all the devices for any network connectivity and allowing any resources including hardware, software, information assets accesses after due authentication."