Malware Threats

Malware threats broadly can be classified under following categories: Backdoor – A backdoor is a piece of malicious code which allows an attacker to connect to the infected target and take control of the target machine. Backdoors can use a lot of
read more ...

Managing technology and information risk

What is risk? Risk is the impact of uncertainty on system, people or organizations etc. Risks can emerge from any type of uncertainty, including those related to technology, finance, health and safety, and security. Cyber security risk refers to security risks to
read more ...

Elements of Cyber Security

Protecting Enterprise from cyber threats entails wholistic Information Risk management. 11 key elements are as below: Application controls – Implement application black/white lists to prevent execution of malicious applications Data leakage prevention – Establish controls for preventing critical data leakage to external
read more ...

Important things about GDPR

The General Data Protection Regulation (GDPR) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). When the GDPR
read more ...

The History of Information Security Governance

Information security governance is the process through which an organization formulates a strategy to secure IT by following an information security program. Often confused with IT security management, IT governance deals with the checking of security strategies to see if they are
read more ...