The World Wide Web is replete with news stories and analyst reports of data leakage and theft ostensibly by ‘trusted’ employees leading to irreparable loss of brand trust and the inevitable lawsuit and resultant fines. How do you secure your precious data against such loss? Here are four steps that every data security practitioner needs to be aware of.
Narrating fictional scenarios may set the pertinent context for deliberations on ‘The Future of Crime’. Popular movie ‘Minority Report’ directed by Steven Spielberg builds around the premise; if criminals can… Read more »
Uday MittalComments Off on Hunting Security Threats
Threat Hunting is the next stage of evolution for organizations seeking to advance their cyber defence strategy. It is an indicator that an organization considers its security practices, mature enough,… Read more »
Ramakrishnan RamaniComments Off on Five Steps to Implement a Successful Data Classification Policy
Many organizations have recognized that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into everyday… Read more »
Recently security researchers at Cisco Talos discovered that malicious hackers had injected a malware into Piriform CCleaner and CCleaner Cloud. CCleaner is a PC optimization tool. It removes potentially unwanted… Read more »
Uday MittalComments Off on Games can be replayed; not life – Bury the Blue Whale
What is this Blue Whale Game? The Blue Whale Game is an internet game. It consist of series of tasks assigned to players / participants by administrators during a 50-day… Read more »