By ROHIT KACHROO, CISO, INDIABULLS tells about
Top steps during the implementation of a Privacy related project
Identification of information and other assets for protecting privacy is the first concern which any organization should address for
By ROHIT KACHROO, CISO, INDIABULLS tells about
Top steps during the implementation of a Privacy related project
Identification of information and other assets for protecting privacy is the first concern which any organization should address for
Denial-of-Service (DoS) attacks have existed since the early days of computing and have evolved into complex and overwhelming security challenges. Organizations have had to worry not just about DoS attacks, but Distributed DoS attacks (DDoS), and mor
http://www.cisoplatform.com/page/build-vs-buy-forrester-s-security-risk-practice-playbook
Why Read This Report
This report outlines a sourcing strategy and Forrester’s decision support solution for security and risk (S&R) executives working to build
Digital rights management solutions are for copyright protection of digital media.The function of DRM solutions is to prevent unauthorized redistribution of digital media post sale and restrict the ways in which consumers can copy content.
( Read mo
Top steps during the implementation of a Cloud Security project
As security is an important aspect of any project it is necessary to align security plan with business goals. There are a perspective series of steps that may be taken to secure the clou
Firstly the CISO has to work with the CIO and the business to understand the business need to implement this and then clearly articulate associated risk exposure to the firm and its stakeholders.
A detailed due diligence has to be completed following
Top technologies / solutions available for the Single Sign-On are :
1.Common Standard Solutions:
2.
ISO 27001 certification in brief
Requirement for solutions related to Database security
A CISO should define the requirement for solutions related to Database security by first understanding the business and threat environment and decide on the most applicable threats and security p
Top steps during the implementation of a project related to Database Security
1.As most of the times, application developers or persons implementing the applications also work as database administrators, it is important that database administration i
Top technologies / solutions available for Database Security include the following:
(Read more: BYOD Security: Fr
Top technologies / solutions available for Application Security
Applications can be broadly classified into three categories viz. Thick client applications (Client/Server), Web Applications (Access over Internet or Intranet) and Mobile Applications.
Top steps during the implementation of a project related to Anti Spam Security
There are many technologies /solutions available to control Spam. There is no one technology which is complete solution by itself. With most anti-spam solutions, the key challenge is trying to balance false negatives (missed spams) vs false positives
Spam in general can be understood as unsolicited email received in large volume. These emails eat up productive time of user/employees of the organization and very important to control it before delivering to users’ mail boxes. A large percentage of
A CISO need to understand the exact requirement before designing the BYOD domain in the organization. Keeping in mind the exact business need and value add which can be or intended to obtain using this technology.
(Read more: 5 easy ways to build yo
Top technologies / solutions available for BYOD Security:
Task for companies who utilize BYOD is to develop a policy that defines exactly what sensitive company information needs to be protected and which employees should have access to this informa
Key advantages of using BYOD Security:
■ Extend corporate security policies to mobile devices
■ Easily disable lost or stolen devices to protect
A brief on what BYOD is all about:
For all multi national companies, improving productivity and employee work life balance is a choice between - either spend a lot of money , provide them mobility or implement secure IT practices and adopt the BYOD
There are so many Endpoint Security Products in the market and every solution has atleast one or more unique feature in their product. So, it’s a tough job for a CISO to choose one of them for his organization. However, a Best Fit Analysis would be b