What is PCI DSS and What are 12 Requirements for it?
Tuesday, June 13, 2017
Posted by CyberSecurityCo...
Reader's rate:
0
Have you ever wondered that we have so many Compliance standards for almost everything in this World? For Food, for electronics, for IT firms heck I guess there would be some standard for Clothes too which I don’t know. So today we are going to talk about something which I am guessing... + continue reading
Ransomware: How Much You Knew and What You Need to Know!
Monday, June 12, 2017
Posted by CyberSecurityCo...
Reader's rate:
0
Ransomware is a type of malware that infects by locking or by encrypting users hard drives unless ransom fee is paid. It holds victim information by asymmetric encryption. Asymmetric encryption (public-private key) is cryptography that use a pair of key to encrypt and decrypt a file... + continue reading
Intricacies Involved with Cyber-Insurance
Monday, June 12, 2017
Posted by CyberSecurityCo...
Reader's rate:
0
Today, no business is full proof against cyber-attacks and data privacy breaches. At the same time cyber criminals are growing more sophisticated day-by-day. The demand for cyber-insurance has grown as a result. Globally around 33% of big/mid/small size organizations have started opting for some... + continue reading
Last Line of Defense: Cyber-Insurance
Monday, June 12, 2017
Posted by CyberSecurityCo...
Reader's rate:
0
The booming phrase in Information Security/Cyber Security around which is becoming the backbone of every organization and the businesses-corporates revolve around is Risk Management. As a part of risk treatment, identified risks could be mitigated in 4 ways: Accept, Avoid, Reduce and Transfer... + continue reading
Techniques used by Social Engineers and Countermeasures
Wednesday, June 7, 2017
Posted by CyberSecurityCo...
Reader's rate:
0
Instead of penetrating the network, Breaching the people who run it.   The previous article " The Art of Social Engineering!! ", what is the social engineering attack and how attackers exploit human elements to traps victims into believing the authenticity... + continue reading
What is PCI DSS and What are 12 Requirements for it?
Ransomware: How Much You Knew and What You Need to Know!
Intricacies Involved with Cyber-Insurance
Last Line of Defense: Cyber-Insurance
Techniques used by Social Engineers and Countermeasures

Home Page

Security Articles

What is PCI DSS and What are 12 Requirements for it?
81views
reads
0 today
Tuesday, 13/06/17 - 0 comment(s)
Have you ever wondered that we have so many Compliance standards for almost everything in this World? For Food, for electronics, for IT firms heck I guess there would be some standard for Clothes... + continue reading

Best Practices

369
reads
0 today
Thursday, 09/03/17 - 0 comment(s)
Some of the major data breaches have been carried out by internal users. A couple of examples are Sports Direct in 2017 and Sage in 2016. In fact, a research by Intel Security had estimated that... + continue reading

Security News

WannaCry Ransomware Advisory - Tata Consultancy Services (TCS)
Monday, 15/05/17
347views
reads
0 today
0 comment(s)
WannaCry Ransomware Advisory A widespread ransomware campaign is affecting enterprises globally with reports of tens of thousands of infections spreading rapidly. Tata Consultancy Services (TCS) is... + continue reading

Snippets

Wiper Malware And It’s Evolution as Ransomware
Views:
1,027
reads
0 today
Monday, 27/02/17 - 0 comment(s)
Wiper Malware has been associated with the attacks in 2012 where Shamoon, a wiper malware sample was used to attack a Reputed Saudi oil firm. The infection rendered workstations unusable and... + continue reading

Recent Posts

What is PCI DSS and What are 12 Requirements for it?
Views:
81
reads
0 today
Tuesday, 13/06/17 - 0 comment(s)
Have you ever wondered that we have so many Compliance standards for almost everything in this World? For Food, for electronics, for IT firms heck I guess there would be some standard for Clothes... + continue reading

This Month Most Popular

The Art of Social Engineering!!
189views
reads
0 today
Monday, 29/05/17 - 0 comment(s)
What comes first in our mind after here the word is "Social Engineering", I am too smart to be fooled, but in reality is it so!! Completing master in information security and thereafter... + continue reading

Featured Articles

What is PCI DSS and What are 12 Requirements for it?
Tuesday, 13/06/17
Total views: 81
0 comment(s)
Have you ever wondered that we have so many Compliance standards for almost everything in this World? For Food, for electronics, for IT firms heck I guess there would be some standard for Clothes too which I don’t know. So today we are going to talk about something which I am guessing is a very important banking Standard that is PCI... + continue reading
Ransomware: How Much You Knew and What You Need to Know!
Monday, 12/06/17
Total views: 116
0 comment(s)
Ransomware is a type of malware that infects by locking or by encrypting users hard drives unless ransom fee is paid. It holds victim information by asymmetric encryption. Asymmetric encryption (public-private key) is cryptography that use a pair of key to encrypt and decrypt a file.   These both keys is uniquely... + continue reading
Intricacies Involved with Cyber-Insurance
Monday, 12/06/17
Total views: 69
0 comment(s)
Today, no business is full proof against cyber-attacks and data privacy breaches. At the same time cyber criminals are growing more sophisticated day-by-day. The demand for cyber-insurance has grown as a result. Globally around 33% of big/mid/small size organizations have started opting for some type of cyber-insurance policy to reduce the... + continue reading
Last Line of Defense: Cyber-Insurance
Monday, 12/06/17
Total views: 72
0 comment(s)
The booming phrase in Information Security/Cyber Security around which is becoming the backbone of every organization and the businesses-corporates revolve around is Risk Management. As a part of risk treatment, identified risks could be mitigated in 4 ways: Accept, Avoid, Reduce and Transfer.   Accept: With this mitigation... + continue reading