Cyber criminals and cyber crime has no physical/logical borders. As the technologies are changing and evolving frequently, it is very important to have a Robust Cyber Defence. For a country… Read more »
There have been many other threats, mitigation techniques and awareness mechanisms available when it comes to Information Security of an organization but this attempt is to discuss about most likely… Read more »
SwamiComments Off on Common Information Security Threats for Working Professionals
In my earlier blog of the series Common Cyber Security Threats for Novice I’ve discussed about common cyber threats which are applicable to everybody. In this blog, I’m trying to bring… Read more »
SwamiComments Off on Common Cyber Security Threats for Novice – Part II
This blog is continuation of security threats exposed and experienced by beginners, infrequent internet users or those who spends much time on social network without appropriate security concerns. Protecting Personal Information… Read more »
MayurakshiRComments Off on Data Protection begins with Data Lifecycle Management
The key to cyber security management is to protect your data. The first step to protect your data is to ‘know’ your data – where, rather where all, is the data, where is it originating, flowing, residing, getting touched, tampered, deleted and such.
Surendra SinghComments Off on Websense 2015 Threat Report: Cybercrime Gets Easier, Attribution Gets Harder, Quality over Quantity and Old becomes the New
The Websense 2015 report looks at how threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise. Redirect chains, code recycling and a host of… Read more »