DSCIComments Off on 7th Best Practices Meet 2015: Are you joining the conversation?
Data Security Council of India (DSCI) is pleased to announce the 7th edition of its Best Practices Meet (BPM). Scheduled from 9-10 July 2015 at Hotel ITC Gardenia in Bengaluru, BPM2015 has “Architecting Security for Digital Transformation” as its theme.
MayurakshiRComments Off on Data Protection begins with Data Lifecycle Management
The key to cyber security management is to protect your data. The first step to protect your data is to ‘know’ your data – where, rather where all, is the data, where is it originating, flowing, residing, getting touched, tampered, deleted and such.
Milan Singh ThakurComments Off on Series: Smart Wearables – It’s Design & Future (Part-1)
The Smart Era is exploding with smart gadgets floating all around us. The willingness to adapt these gadgets is fast-booming. But lets speak facts: are these devices ‘really smart’? A look into their characteristics and some indeed-smart wearables!
In today’s era, we are much more concern about privacy, but we still use unsafe means to make communication. All the bad guys out there are waiting for our personal data to be accessible or leaked to them. Here comes BLEEP, our privacy friend.
Shadow IT, or the event where technology related activities or developments are conducted outside of and without the knowledge of the enterprise IT team, is one of the phenomenon that has gained prominence in recent years.
Abhay BhargavComments Off on 3 Reasons why Information Security demands a “board’s eye-view”
It was two weeks ago. I was chatting with the CFO of a major automobile manufacturing company. This is one of the largest companies in the world. I was waxing eloquent… Read more »