SERIES: The Art of Effective POC – Part – 1
Today technologies are playing most important role in meeting strategic business objectives. Over the period of last 5 to 10 years, there is a significant increase in IT & Security… Read more »
Today technologies are playing most important role in meeting strategic business objectives. Over the period of last 5 to 10 years, there is a significant increase in IT & Security… Read more »
Consumer and enterprise financial institutions have a non-negotiable obligation to protect internal and customer data at all times — whether it is being stored, transmitted or viewed. CISOs often focus… Read more »
What is MDM Technology? MDM is a way to ensure employees stay productive and do not breach corporate policies. Many organizations control activities of their employees using MDM products/services. MDM… Read more »
Bring Your Own Device (BYOD) is the latest trend in many companies. Business requirements for Working from Home, accessing E-mail 24*7, instant customer support etc are increasing and future trend looks like this is continue to be increasing. Exploring risk assessment and security controls.
Are your smart gadgets running on Android? If yes, that means it is running Linux underneath. Well then, get ready to get bugged – because an attacker never sleeps! Yes,… Read more »
Data Security Council of India (DSCI) is pleased to announce the 7th edition of its Best Practices Meet (BPM). Scheduled from 9-10 July 2015 at Hotel ITC Gardenia in Bengaluru, BPM2015 has “Architecting Security for Digital Transformation” as its theme.