A simple 4-step model to information security
- Maintaining & Monitoring IT resource/asset integrity
- Preparing & Limiting damage/loss in the course of attack
- Proper Access control/Authentication & Authorization
- Secure Data Communication
Top 10 ste
A simple 4-step model to information security
Top 10 ste
We had a long and nice week at RSA Conference 2015 in San Franciso. Some of you might have missed the event or missed some of the good talks even though you were there. so we have handpicked the best of RSA just for you.
Important Note:
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
RSA expo floor is the madness that we love. The fringes are more interesting to me than the center. If you want to spot the new go to the fringes. We tried to have a bit of fun this year.
How we did the analysis?
We took pics of booths all around the e
RSA expo floor is the madness that we love. The fringes are more interesting to me than the center. If you want to spot the new go to the fringes. We tried to have a bit of fun this year by analyzing the buzzwords as seen in the expo floor.
How we di
I am on my way back from RSA Conference 2015 @ San Francisco. It is a cloudy day at New York. Perfect day to write a quick blog. Here's my interpretation of Amit Yoran's talk with a bit of my thoughts poured into it.
Taller walls won't solve the probl
I am on my way back from RSA Conference 2015 @ San Francisco. It is a cloudy day at New York. Perfect day to write a quick blog. Here's my interpretation of Amit Yoran's talk with a bit of my thoughts poured into it.
Taller walls won't solve the pro
The effectiveness of cyber security portfolio of an enterprise depends on multiple factors. Efficient Vulnerability Management Program is one of the critical parameters to be considered. Considering the dynamic nature of the attack vectors, it is im
SAP has released the monthly critical patch update for April 2015. This patch update closes a lot of vulnerabilities in SAP products. Most of them are potential information disclosure vulnerabilities.
The most critical issues found by other researcher