Monday, October 9, 2017
Posted by Hussainali Ladha
Reader's rate:
0
SWIFT’s Customer Security Programme (CSP) has been established to support customers in the fight against cyber-fraud. Its key objectives are   1) CSP will define an operational and security baseline that customers must meet for the SWIFT customer infrastructure 2) CSP will... + continue reading
GDPR – A practical challenges  of data classification
Tuesday, October 3, 2017
Posted by Cyber Security ...
Reader's rate:
0
The organizations' have become dependent on customer data as it is being treated as supreme wealth. The data is globally accessible from everything and everywhere, from legacy applications, web interfaces, big data files shares and more importantly the messaging system. The data leakage of key... + continue reading
Thursday, September 28, 2017
Posted by Cyber Security ...
Reader's rate:
0
Gazer is a highly advanced piece of malware spotted by ESET in one of their new researchers. This new malware campaign is targeted against ministries, consulates, and embassies around the world. According to the reports, Gazer has managed to infect a number of computers worldwide, with the most... + continue reading
Tuesday, September 26, 2017
Posted by Pankaj Kashyap
Reader's rate:
0
Here are the steps explaining what happens while a user tries to access a web-application resource which is protected by Oracle Access Manager (OAM) server. I have included few OAM components as well while explaining the flow. In this example. Have considered custom login page placed at... + continue reading
Cloud Workload Protection Platforms (CWPP)
Monday, September 25, 2017
Posted by Rajesh Rao
Reader's rate:
0
Organizations are rapidly adopting public cloud services like Amazon Web Services, IBM Cloud, Microsoft Azure, Rackspace Clouds etc., so as to extend business agility, scalability and cost efficiency. The advantages provided by the public cloud will no longer be ignored as competitive pressures... + continue reading
GDPR – A practical challenges  of data classification
Cloud Workload Protection Platforms (CWPP)

Home Page

Security Articles

53views
reads
0 today
Monday, 09/10/17 - 0 comment(s)
SWIFT’s Customer Security Programme (CSP) has been established to support customers in the fight against cyber-fraud. Its key objectives are   1) CSP will define an operational and... + continue reading

Best Practices

718
reads
1 today
Thursday, 09/03/17 - 0 comment(s)
Some of the major data breaches have been carried out by internal users. A couple of examples are Sports Direct in 2017 and Sage in 2016. In fact, a research by Intel Security had estimated that... + continue reading

Security News

Thursday, 21/09/17
222views
reads
3 today
0 comment(s)
With the rapid growth of technology in the Digital World, the number of cybersecurity breaches has grown proportionately or even more. The year 2017 has witnessed numerous ransomware and malware... + continue reading

Snippets

Wiper Malware And It’s Evolution as Ransomware
Views:
1,767
reads
1 today
Monday, 27/02/17 - 0 comment(s)
Wiper Malware has been associated with the attacks in 2012 where Shamoon, a wiper malware sample was used to attack a Reputed Saudi oil firm. The infection rendered workstations unusable and... + continue reading

Recent Posts

Views:
53
reads
0 today
Monday, 09/10/17 - 0 comment(s)
SWIFT’s Customer Security Programme (CSP) has been established to support customers in the fight against cyber-fraud. Its key objectives are   1) CSP will define an operational and... + continue reading

This Month Most Popular

222views
reads
3 today
Thursday, 21/09/17 - 0 comment(s)
With the rapid growth of technology in the Digital World, the number of cybersecurity breaches has grown proportionately or even more. The year 2017 has witnessed numerous ransomware and malware... + continue reading

Featured Articles

Cloud Workload Protection Platforms (CWPP)
Monday, 25/09/17
Total views: 115
0 comment(s)
Organizations are rapidly adopting public cloud services like Amazon Web Services, IBM Cloud, Microsoft Azure, Rackspace Clouds etc., so as to extend business agility, scalability and cost efficiency. The advantages provided by the public cloud will no longer be ignored as competitive pressures accelerate mainstream business adoption. But,... + continue reading
Password managers and why you should use it?
Sunday, 24/09/17
Total views: 170
0 comment(s)
Gone are the days, when we needed to store the most valuable thing in a locker(physical safe). Now, most of the valuable assets we have now are protected digitally with a password string, not with a physical safe. So anyone located anywhere in the world can access it given the password is known, or can be inferred.   The “... + continue reading
Thursday, 21/09/17
Total views: 222
0 comment(s)
With the rapid growth of technology in the Digital World, the number of cybersecurity breaches has grown proportionately or even more. The year 2017 has witnessed numerous ransomware and malware attacks across the world so far. The new malware “Xafecopy Trojan” which steals money from mobile phone users has been recently detected by... + continue reading
 How to be safe with IoT?
Thursday, 14/09/17
Total views: 201
0 comment(s)
IOT device defines as any object connected to the internet. Examples include TV, Smart cars, Cameras, Door locks (including ones with Bluetooth), Medical Devices, Lights, Fitness Bands., Washing Machines, Coffee Maker, Other Daily appliances. Basically, if you have any home appliance is connected to the Internet connection, and then it becomes... + continue reading