There have been many other threats, mitigation techniques and awareness mechanisms available when it comes to Information Security of an organization but this attempt is to discuss about most likely… Read more »
In my earlier blog of the series Common Cyber Security Threats for Novice I’ve discussed about common cyber threats which are applicable to everybody. In this blog, I’m trying to bring… Read more »
This blog is continuation of security threats exposed and experienced by beginners, infrequent internet users or those who spends much time on social network without appropriate security concerns. Protecting Personal Information… Read more »
I illustrated India’s contribution in IETF in my earlier ‘India in IETF’ post and asked you to provide comments and suggestions on how we can improve the quality and quantity… Read more »
The term “Information Security”, once deliberately used by sagacious people of Information Security community to emphasis on the enterprise-wide scope (“it is not only about IT”) of the term, is getting faded away and the new term “Cyber Security” is replacing its predecessor.
About The OWASP Mobile Security Project The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain… Read more »