All Posts (2014)

Sort by

How To Evaluate Network Security Vendor

As per our IT Security Audit report of Ernst and Young, We have to protect our network for misuse of the Internet and we required proper analyzer to analyze our network, they also guide us for the Implementation of BYOD policy in the company and Prot

Read more…

How To Evaluate An ERP Project

Agriculture Insurance Company of India Ltd. (AIC) provides crop insurance coverage to 2.4 crore farmers annually, 86% of whom belong to the small and marginal category. To balance the twin challenge of crop insurance business, viz. reaching the remot

Read more…
Views: 224
Comments: 0

Leadership through Football

world-cup-2014.jpg?w=333&h=188FIFA world cup fever is on, filled with flying goals, penalty, corner shots and even bites marks. Not to mention it also teaches a lot of leadership lessons that helps connects and inspire your team. The topic of leadership from sports world is commo

Read more…

30l06ra.jpgFor many organizations the success or failure of IT initiatives is predicated on the selection of the appropriate technology vendor. Despite the critical nature of this process, many organizations underestimate the time and effort it takes to make a

Read more…

How to Say "No"

8669799695?profile=original

How to Say “NO”

Why did I say, “Yes” when I really wanted to say No? You ‘d probably be asking this question every time you agree to another task. Even though you do not have time or resources to do something but you commit to another one. For example

Read more…

Rating future Security Services-Cloud ?


Customer in Dilemma with Current Business Trends around security-Every business runs on some basic trust. In today’s digital world, Compliance and standard are the enablers to achieve security along with optimized performance. Every service company

Read more…
Views: 111
Comments: 0

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)