Data Protection begins with Data Lifecycle Management

      Comments Off on Data Protection begins with Data Lifecycle Management

The key to cyber security management is to protect your data. The first step to protect your data is to ‘know’ your data – where, rather where all, is the data, where is it originating, flowing, residing, getting touched, tampered, deleted and such.

Series: Smart Wearables – It’s Design & Future (Part-1)

      Comments Off on Series: Smart Wearables – It’s Design & Future (Part-1)

The Smart Era is exploding with smart gadgets floating all around us. The willingness to adapt these gadgets is fast-booming. But lets speak facts: are these devices ‘really smart’? A look into their characteristics and some indeed-smart wearables!

‘Shadow IT’ – The light of innovation or the darkness of ignonimity?

Shadow IT, or the event where technology related activities or developments are conducted outside of and without the knowledge of the enterprise IT team, is one of the phenomenon that has gained prominence in recent years.

3 Reasons why Information Security demands a “board’s eye-view”

      Comments Off on 3 Reasons why Information Security demands a “board’s eye-view”

It was two weeks ago. I was chatting with the CFO of a major automobile manufacturing company. This is one of the largest companies in the world. I was waxing eloquent… Read more »