Wednesday, October 18, 2017
Posted by Cyber Security ...
Reader's rate:
0
The vendor risk assessment is considered important in this world considering the increase of cybersecurity threats. Vendor Risk Management (VRM) is the process in order to ensure that their vendors does not create any loss to the business in any form (like financial loss, reputation loss, data... + continue reading
Monday, October 9, 2017
Posted by Hussainali Ladha
Reader's rate:
0
SWIFT’s Customer Security Programme (CSP) has been established to support customers in the fight against cyber-fraud. Its key objectives are   1) CSP will define an operational and security baseline that customers must meet for the SWIFT customer infrastructure 2) CSP will... + continue reading
GDPR – A practical challenges  of data classification
Tuesday, October 3, 2017
Posted by Cyber Security ...
Reader's rate:
0
The organizations' have become dependent on customer data as it is being treated as supreme wealth. The data is globally accessible from everything and everywhere, from legacy applications, web interfaces, big data files shares and more importantly the messaging system. The data leakage of key... + continue reading
Thursday, September 28, 2017
Posted by Cyber Security ...
Reader's rate:
0
Gazer is a highly advanced piece of malware spotted by ESET in one of their new researchers. This new malware campaign is targeted against ministries, consulates, and embassies around the world. According to the reports, Gazer has managed to infect a number of computers worldwide, with the most... + continue reading
Tuesday, September 26, 2017
Posted by Pankaj Kashyap
Reader's rate:
0
Here are the steps explaining what happens while a user tries to access a web-application resource which is protected by Oracle Access Manager (OAM) server. I have included few OAM components as well while explaining the flow. In this example. Have considered custom login page placed at... + continue reading
GDPR – A practical challenges  of data classification

Home Page

Security Articles

51views
reads
2 today
Wednesday, 18/10/17 - 0 comment(s)
The vendor risk assessment is considered important in this world considering the increase of cybersecurity threats. Vendor Risk Management (VRM) is the process in order to ensure that their... + continue reading

Best Practices

735
reads
2 today
Thursday, 09/03/17 - 0 comment(s)
Some of the major data breaches have been carried out by internal users. A couple of examples are Sports Direct in 2017 and Sage in 2016. In fact, a research by Intel Security had estimated that... + continue reading

Security News

Thursday, 21/09/17
236views
reads
0 today
0 comment(s)
With the rapid growth of technology in the Digital World, the number of cybersecurity breaches has grown proportionately or even more. The year 2017 has witnessed numerous ransomware and malware... + continue reading

Snippets

Wiper Malware And It’s Evolution as Ransomware
Views:
1,805
reads
3 today
Monday, 27/02/17 - 0 comment(s)
Wiper Malware has been associated with the attacks in 2012 where Shamoon, a wiper malware sample was used to attack a Reputed Saudi oil firm. The infection rendered workstations unusable and... + continue reading

Recent Posts

Views:
51
reads
2 today
Wednesday, 18/10/17 - 0 comment(s)
The vendor risk assessment is considered important in this world considering the increase of cybersecurity threats. Vendor Risk Management (VRM) is the process in order to ensure that their... + continue reading

This Month Most Popular

Password managers and why you should use it?
200views
reads
2 today
Sunday, 24/09/17 - 0 comment(s)
Gone are the days, when we needed to store the most valuable thing in a locker(physical safe). Now, most of the valuable assets we have now are protected digitally with a password string, not with... + continue reading

Featured Articles

Wednesday, 18/10/17
Total views: 51
0 comment(s)
The vendor risk assessment is considered important in this world considering the increase of cybersecurity threats. Vendor Risk Management (VRM) is the process in order to ensure that their vendors does not create any loss to the business in any form (like financial loss, reputation loss, data loss etc.). This article will throw some light on... + continue reading
Monday, 09/10/17
Total views: 96
0 comment(s)
SWIFT’s Customer Security Programme (CSP) has been established to support customers in the fight against cyber-fraud. Its key objectives are   1) CSP will define an operational and security baseline that customers must meet for the SWIFT customer infrastructure 2) CSP will define an assurance framework to ensure SWIFT customers... + continue reading
GDPR – A practical challenges  of data classification
Tuesday, 03/10/17
Total views: 183
0 comment(s)
The organizations' have become dependent on customer data as it is being treated as supreme wealth. The data is globally accessible from everything and everywhere, from legacy applications, web interfaces, big data files shares and more importantly the messaging system. The data leakage of key information is considered as potential risk for... + continue reading
Thursday, 28/09/17
Total views: 189
0 comment(s)
Gazer is a highly advanced piece of malware spotted by ESET in one of their new researchers. This new malware campaign is targeted against ministries, consulates, and embassies around the world. According to the reports, Gazer has managed to infect a number of computers worldwide, with the most victims being located in Europe. According to ESET... + continue reading