Featured Posts (235)

Sort by

DDoS Security Checklist

Introduction

Since the early days of the internet, DDoS had been a favorite weapon of cyber-criminals. Recently there was news about the biggest DDoS attack in history targeted towards Spamhaus, an anti-spam group. The attacks reportedly peaked at 300

Read more…

CISO Mantra on Data Sanitization

This is a fundamental principle of the data privacy jurisprudence that the organization cannot disclose personal information without having prior consent of the data subject unless it is required by law. Global data privacy laws imbibed this principl

Read more…
Views: 409
Comments: 0

Risk of Residual passwords

Our dependence on E-services has increased tremendously. All such services have the usernames and Passwords. This is main gateway for entry in to systems. Apart from that, transactional passwords. Even the password with secured and digital certified

Read more…
Views: 254
Comments: 0

Magic, Hacking and Kevin Mitnick

Is there anything common to Magic and Hacking? Is there a hacker in a magician? Is there a magician in a hacker?

In my personal journey, I adopted Magic first and later got acquainted with Hacking when I met my co-founder and started working on a prod

Read more…

Tips for Vendor Management

8669799257?profile=originalOne of the most important functionality which we do in our day to day work is Vendor Management,or should I say how to do it effectively. Here are a few tips which I would recommend and if needed you can add as well:

1.Always do a thorough check of th

Read more…
Views: 224
Comments: 2