The Data Leak Prevention Project was rolled out in Lanco Infratech Ltd
- To protect its proprietary assets and business data against any loss or leakage
- To meet regulatory requirements as per the segment of industry.
- To increase awareness amongst the
The Data Leak Prevention Project was rolled out in Lanco Infratech Ltd
Defcon 22, the largest conference for hackers with 15,000 attendees saw some of the most interesting researches in the field of security and hacking. From hundreds of talks, we have handpicked the top presentations which are relevant for security man
Vulnerability Management System was implemented as a practice within the Organization across the Global Business Unit (India, Middle East & Africa). The implementation included Vulnerability Assessment and Remediation. The assessment is made based
'Development of enterprise level Information Security Policies, Procedures and Standards' was an initiative to ensure we have an enterprise wide policy, procedures and standards for ensuring smooth Governance & Compliance of Information Security prac
How to Say “NO”
Why did I say, “Yes” when I really wanted to say No? You ‘d probably be asking this question every time you agree to another task. Even though you do not have time or resources to do something but you commit to another one. For example
We are safe, checking our software's for fallacy, for hacker's tricks. However we never think that the machine we run could be malicious itself. Their could be havoc if so happened, Prof. Indranil Sengupta(IIT-kgp) enlightens us about such threat and
Fundamentally we associate branding with bragging ,thus embarrassment. Rather branding is what others think of you, a response to the stimulus you provide. Adityanath Jha(CEO Crayon Pictures, Former Global Head of Branding at infosys) shows a comp
The case for making dashboards; clinical and business; providing real-time and actionable information goes beyond the traditional advantages. Do it right and you get the opportunity to shape the organization from the ground up!!!!
Making Actionable Da
Cybercrime and espionage have cost companies over $500 Billionhttp://ctt.ec/12Ga3+" width="33" height="30" />in lost IP and untold lost jobs and productivity. The term ‘Advanced Persistent Threat’ was originally used by US Air Force security analysts
During the last few penetration testing conducted for certain organizations, we have discovered a surprising fact that almost all the SIEM implementation had gaps on the implementation levels. For example, in certain cases, SIEM did not even detect
“Combining the Physical world to the virtual world by connecting the sensors, sensors will be everywhere”.
Organizations are hopeful that companies will eventually allow consumers to buy products based on their personal preferences, not just dependi
Introduction
Since the early days of the internet, DDoS had been a favorite weapon of cyber-criminals. Recently there was news about the biggest DDoS attack in history targeted towards Spamhaus, an anti-spam group. The attacks reportedly peaked at 300
We heavily rely on references while taking a decision on adoption of a new technology or a product. However, there is no dedicated analysis of product leadership purely based on customer recommendation. From CISO Platform technology Analyst team, w
This is a fundamental principle of the data privacy jurisprudence that the organization cannot disclose personal information without having prior consent of the data subject unless it is required by law. Global data privacy laws imbibed this principl
There is a common misconception that cyber criminals and hacktivists only target large enterprises to reap a bumper. The reality is actually very different, recently published surveys reveal that
Our dependence on E-services has increased tremendously. All such services have the usernames and Passwords. This is main gateway for entry in to systems. Apart from that, transactional passwords. Even the password with secured and digital certified
IT arena is like a security battle ground, where internet is fundamentally open considering the major far-ends like social media, mobility, cloud, virtualisation etc which leads to targeted attacks.
On any given day; any organisation can suffer irrepa
Jayantha Prabhu,CTO , Essar Group, talks to CISO Platform on the Top Security Trends that he feels, will define the future.
What do you think are the top technologies that will define the future?
As I see it, broadly the following technologies will
Is there anything common to Magic and Hacking? Is there a hacker in a magician? Is there a magician in a hacker?
In my personal journey, I adopted Magic first and later got acquainted with Hacking when I met my co-founder and started working on a prod