SAP Mobile Platform Security: Introduction
Mobile devices are actively integrated into business processes. Companies have more and more business applications and mobile devices. Employees increasingly bring their own equipment to the workplace (BYOD
SAP Mobile Platform Security: Introduction
Mobile devices are actively integrated into business processes. Companies have more and more business applications and mobile devices. Employees increasingly bring their own equipment to the workplace (BYOD
Dear Colleagues,
“ Balance Checking Software App “ is an software application is doing rounds on WhatsApp purportedly to facilitate checking of balance in customers' bank accounts. The Reserve Bank of India (RBI) on Saturday (11th April 2015)warned th
Setting up an Security Incident Response Team (SIRT) is a challenging job.
Things To Keep In Mind:
1.Organization's IT assets and required security measures
2.Log of earlier attacks gives an idea on vulnerable assets and attacks areas
3.Organization'
Each application has several security settings that do not fit into any of the critical issues groups mentioned in our series of articles.Among such settings there are both standard settings (such as password length or the number of attempts given to
The developers of the free & hugely popular encryption program dropped a bombshell at the end of May when they abruptly abandoned the project. The top of their website was emblazoned with the following message in red: "WARNING: Using our Software is
With this article we are starting a new series of guidelines describing some basic assessment procedures one can carry out on various business applications that would help security professionals to
What is your Information security posture? Is there a way to put a measurable score for information security? Can I set a SMART Infosec KPI? If these questions ever crossed your mind, then you are probably at the right place.
I try to address these qu
( Read more: Checklist to Evaluate a DLP Provider )
What will you Learn:
Today we are going on with our series of articles where we describe the 33 steps to security. The subject is of great significance not only to a small group of SAP infosec specialists, but to all those people who work with ERP systems as recent years
The term ‘Cyber Domain’ has been used widely by various experts, sometimes interchangeably with ‘Cyber Space’, to imply – “the global domain within the information environment that encompasses the interdependent networks of information technology inf
( Read more: Checklist to Evaluate a DLP Provider )
What will you Learn:
We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking, in which 410 companies have participated in the enterprise segment. This is a preview of the key findings on the implementation of
We are thrilled to have received so many wonderful ideas and suggestions during the breakfast series specifically focusing on CPI findings. Here are the quick highlights!
What was the objective of the Community Breakfast?
(Read more: Annual Survey on Cloud Adoption Status Across Industry Verticals)
Quick Glimpse
Fairly technical content with demos where Jacob Holcomb speaks on Internet Of Things, Threat Mode
Based on Type of Attack:
For Organization Chart & Module click here
Roles & Responsibilities of IR Team
IR Management-
6steps in Incident Response Process:
Escalation - When an incident is not yet tackled, based on its priority, it is escalated to a higher level. This enables business to f
CISO Platform presents an exciting opportunity to listen to Hugo Teso, who recently “created global news by demonstrating how an aircraft can be compromised and remotely controlled by using an android phone"!
Thought this webinar is super exciting an
Third critical area. Unnecessary functionality
What is the most common problem of any more or less complex application? In essence, they almost always have numerous unnecessary functions aimed to perform multiple tasks.
Obviously, that makes the whol