MayurakshiRComments Off on Data Protection begins with Data Lifecycle Management
The key to cyber security management is to protect your data. The first step to protect your data is to ‘know’ your data – where, rather where all, is the data, where is it originating, flowing, residing, getting touched, tampered, deleted and such.
In today’s era, we are much more concern about privacy, but we still use unsafe means to make communication. All the bad guys out there are waiting for our personal data to be accessible or leaked to them. Here comes BLEEP, our privacy friend.
Abhay BhargavComments Off on 3 Reasons why Information Security demands a “board’s eye-view”
It was two weeks ago. I was chatting with the CFO of a major automobile manufacturing company. This is one of the largest companies in the world. I was waxing eloquent… Read more »
Abhay BhargavComments Off on The 3 kinds of people to have on your InfoSec Team
Information Security is a critical facet of the modern enterprise that is riven with uncertainty and a growing list of possible threats. Building a solid information security team (own or outsourced) is critical.
DSCIComments Off on Annual Report 2014-15: Data Protection Outlook
DSCI is pleased to release and share its Annual Report 2014-15: Data Protection Outlook – ‘Leveraging Data Protection to Enhance Trust in the Digital Economy’. The report outlines the achievements,… Read more »
DSCIComments Off on The 9th AISS 2014 Event Report is now OUT!
We are pleased to release the proceedings and outcomes of the event, titled, “AISS 2014: Strengthening Perspectives on Cyber Security & Privacy.” The event report highlights notable initiatives and sessions, as… Read more »