Let’s face it – “Your online presence is not secure!” Yes, before you wonder in awe about all those identities you have created on various online platforms here are some… Read more »
SwamiComments Off on Common Cyber Security Threats for a Novice
This blog is more focused on the security threats exposed and experienced by beginners, infrequent internet users or those who spend much time on social network without appropriate security concerns. As part of a series, this is the first blog post.
Janak MajithiyaComments Off on SERIES: The Art of Effective POC – Part – 3
Before I start on Part 3, till now we have seen: Sr Phase Steps 1 Pre POC Identify business requirement and its weightage Multiple products & feature analysis Organization’s budget… Read more »
DSCIComments Off on Securing Organizations in the Cyberspace
Corporate Members benefit from a variety of services that encompass working with DSCI on organizational security strategies, legal and compliance requirements and specific challenges pertaining to implementation of security and privacy programs.
Harsha BanavaraComments Off on Cloud Data Privacy: Is there a ‘Standard’ approach?
With the advent of IoT (Internet of Things) and IoE (Internet of Everything) concerns about Data Privacy are predicted to increase exponentially. It is therefore not a big surprise that… Read more »