The History of Information Security Governance

Information security governance is the process through which an organization formulates a strategy to secure IT by following an information security program. Often confused with IT security management, IT governance deals with the checking of security strategies to see if they are
read more ...

Vulnerability assessment and penetration testing – Basics

Vulnerability assessment and penetration testing, abbreviated for VAPT, have become an important part of security testing. It’s an assessment process where computers, networks, operating systems websites, application software etc., are scanned and tested thoroughly to find out the possible flaws and vulnerabilities.
read more ...

Mobile Threat Defense…..The need of the hour!!

Mobile devices are powerful computers, always connected to Internet and used without interruption in most cases. It will be worth to put in perspective that mobile device is one of the key productivity tools, which helps in generating business for many enterprises
read more ...

Petya – A destructive Wiper!!

The PETYA attack that began infecting computers in several countries around the globe starting Tuesday, 27th June was not designed with the intention of restoring the computers at all is the latest finding. The malware was designed to look like ransomware but
read more ...

Whaling

Whaling …..another sophisticated social engineering technique…. As we all are aware (I am hoping this to be true), Social engineering is the technique, wherein the hackers exploit the human psychology, tricking people to get access of sensitive information. As we try and
read more ...

Make it tough for attacker!!

Get complete visibility of your assets, applications, network and their interaction with users. Threat identification, enforcement of controls and data flow restrictions are must do’s. Focus on attack behaviors at multiple stages and create enough opportunities’ to identify attack during all 4
read more ...