In its June 2, 2016 notification, RBI has issued new cybersecurity guidelines, which says that scheduled commercial banks (private, foreign and nationalized banks listed in the schedule of RBI Act, 1934) must proactively create or modify their polici
Cyber security is an increasing concern for every business. And especially for banks who held a lot of confidential data and transaction details, it is utmost important for banks to have required cyber security solution and processes at the place.
IoT security is being approached by many organizations and from different perspectives . In this post we give a birds eye view of the players.This is not intended to be comprehensive. We will supplement this in time with deeper dive at different la
Author - Anil Upadhyay, DM - ITGS, ITSD, Gujarat Gas Limited
We have listed a Key Parameter are required for Security Incident and Event Management and The Framework was attached at the end.
Major Parameters To Consider :
Ability to identify non
This gives a glimpse of Advanced Security Operations Centre (SOC) Features &amp; Technical Capabilities. This document is not explicit, it assumes you have…
This was presented at SACON and speakers explain subjects in detail during sessions for de
Miasm is a reverse engineering framework created in 2006 and first published in 2011 (GPL). Since then, it has been continuously improved through a daily use. The framework is made of several parts, including an assembler/disassembler for several arc
It has been suggested that any new development will include less than 1% original code. If this isn’t presently true, it will likely be as time progresses.
With any security program, the goal is to identify the vulnerabilities, the relate
Note: this page contains paid content.
Please, subscribe to get an access.