What is PCI DSS and What are 12 Requirements for it?
Tuesday, June 13, 2017
Posted by CyberSecurityCo...
Reader's rate:
0
Have you ever wondered that we have so many Compliance standards for almost everything in this World? For Food, for electronics, for IT firms heck I guess there would be some standard for Clothes too which I don’t know. So today we are going to talk about something which I am guessing... + continue reading
Ransomware: How Much You Knew and What You Need to Know!
Monday, June 12, 2017
Posted by CyberSecurityCo...
Reader's rate:
0
Ransomware is a type of malware that infects by locking or by encrypting users hard drives unless ransom fee is paid. It holds victim information by asymmetric encryption. Asymmetric encryption (public-private key) is cryptography that use a pair of key to encrypt and decrypt a file... + continue reading
Intricacies Involved with Cyber-Insurance
Monday, June 12, 2017
Posted by CyberSecurityCo...
Reader's rate:
0
Today, no business is full proof against cyber-attacks and data privacy breaches. At the same time cyber criminals are growing more sophisticated day-by-day. The demand for cyber-insurance has grown as a result. Globally around 33% of big/mid/small size organizations have started opting for some... + continue reading
Last Line of Defense: Cyber-Insurance
Monday, June 12, 2017
Posted by CyberSecurityCo...
Reader's rate:
0
The booming phrase in Information Security/Cyber Security around which is becoming the backbone of every organization and the businesses-corporates revolve around is Risk Management. As a part of risk treatment, identified risks could be mitigated in 4 ways: Accept, Avoid, Reduce and Transfer... + continue reading
Techniques used by Social Engineers and Countermeasures
Wednesday, June 7, 2017
Posted by CyberSecurityCo...
Reader's rate:
0
Instead of penetrating the network, Breaching the people who run it.   The previous article " The Art of Social Engineering!! ", what is the social engineering attack and how attackers exploit human elements to traps victims into believing the authenticity... + continue reading
What is PCI DSS and What are 12 Requirements for it?
Ransomware: How Much You Knew and What You Need to Know!
Intricacies Involved with Cyber-Insurance
Last Line of Defense: Cyber-Insurance
Techniques used by Social Engineers and Countermeasures

Home Page

Security Articles

What is PCI DSS and What are 12 Requirements for it?
83views
reads
2 today
Tuesday, 13/06/17 - 0 comment(s)
Have you ever wondered that we have so many Compliance standards for almost everything in this World? For Food, for electronics, for IT firms heck I guess there would be some standard for Clothes... + continue reading

Best Practices

370
reads
1 today
Thursday, 09/03/17 - 0 comment(s)
Some of the major data breaches have been carried out by internal users. A couple of examples are Sports Direct in 2017 and Sage in 2016. In fact, a research by Intel Security had estimated that... + continue reading

Security News

WannaCry Ransomware Advisory - Tata Consultancy Services (TCS)
Monday, 15/05/17
348views
reads
1 today
0 comment(s)
WannaCry Ransomware Advisory A widespread ransomware campaign is affecting enterprises globally with reports of tens of thousands of infections spreading rapidly. Tata Consultancy Services (TCS) is... + continue reading

Snippets

Wiper Malware And It’s Evolution as Ransomware
Views:
1,028
reads
1 today
Monday, 27/02/17 - 0 comment(s)
Wiper Malware has been associated with the attacks in 2012 where Shamoon, a wiper malware sample was used to attack a Reputed Saudi oil firm. The infection rendered workstations unusable and... + continue reading

Recent Posts

What is PCI DSS and What are 12 Requirements for it?
Views:
83
reads
2 today
Tuesday, 13/06/17 - 0 comment(s)
Have you ever wondered that we have so many Compliance standards for almost everything in this World? For Food, for electronics, for IT firms heck I guess there would be some standard for Clothes... + continue reading

This Month Most Popular

The Art of Social Engineering!!
191views
reads
2 today
Monday, 29/05/17 - 0 comment(s)
What comes first in our mind after here the word is "Social Engineering", I am too smart to be fooled, but in reality is it so!! Completing master in information security and thereafter... + continue reading

Featured Articles

Techniques used by Social Engineers and Countermeasures
Wednesday, 07/06/17
Total views: 93
0 comment(s)
Instead of penetrating the network, Breaching the people who run it.   The previous article " The Art of Social Engineering!! ", what is the social engineering attack and how attackers exploit human elements to traps victims into believing the authenticity of attacker was discussed. Also the popular social... + continue reading
Writing Effective Application Security Requirements
Monday, 05/06/17
Total views: 108
0 comment(s)
When an enterprise is planning to deploy a new software product into their operational environment, the foremost thing is to be performed is to identify the security requirements followed by a degree of the risk level of each risk and mitigation steps by the risk assessor. When the security requirements are prepared, the risk professional... + continue reading
How Big Data Comes Handy in Security Analytics?
Monday, 05/06/17
Total views: 116
0 comment(s)
You have a tremendous amount of information all around you - structured data, unstructured data, sensitive data, compliant data, and more. From enterprise databases to social media posts, imagine a scenario where you could take your data in all its various forms, transform it to understandable data, apply the right analytics to it, and... + continue reading
All you know about STRIDE - Elevation of Privilege Threat (EOP)
Thursday, 01/06/17
Total views: 136
0 comment(s)
STRIDE is a security threat model, developed by Microsoft that categorize the security threat associated with the computer. It consists of six different threat categories which are: Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege   This article is all about the... + continue reading