SwamiComments Off on Common Information Security Threats for Working Professionals
In my earlier blog of the series Common Cyber Security Threats for Novice I’ve discussed about common cyber threats which are applicable to everybody. In this blog, I’m trying to bring… Read more »
Bharat JoshiComments Off on IETF Series: How IETF works? (Part II)
I illustrated India’s contribution in IETF in my earlier ‘India in IETF’ post and asked you to provide comments and suggestions on how we can improve the quality and quantity… Read more »
About The OWASP Mobile Security Project The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain… Read more »
Harsha BanavaraComments Off on Cloud Data Privacy: Is there a ‘Standard’ approach?
With the advent of IoT (Internet of Things) and IoE (Internet of Everything) concerns about Data Privacy are predicted to increase exponentially. It is therefore not a big surprise that… Read more »
DSCIComments Off on 7th Best Practices Meet: Critical conversations on ‘Architecting Security for Digital Transformation’
With the focus on making security an inherent component of Digital Transformation, the 7th Best Practices Meet, commonly referred to as ‘BPM’, was held in Bengaluru between 9-10 July, 2015. It successfully looked into the structural and systematic analysis of security, and drove deliberations towards the need to build security by design.