IT security
-
Will Donald ‘Trump’ the Cyber Security Industry?
By Happy Blob On 13 Mar 2017Hey guys I am back! Look who I brought with me today: Mr. POTUS himself! President Donald Trump walked into office talking about fighting terrorism and also making America secure and safer for its people. While there are still doubts...
-
Privileged Identity Management – Why We Need It?
By Susmita Sankaran On 25 Nov 2016In an organization’s IT environment, there are several user accounts. Out of these, the “Super User accounts” are usually among the most important ones as they are used for System administration. These accounts are also called root accounts, administrator, admin...
-
Security Operations Center – The Heart of Effective Detection
By Karthik Palanisamy On 15 Sep 2016Organizations around the world are facing cyber-attacks at regular frequency. Technology is evolving and so are safe guards, however, the threat perception is changing only for the worse. Even the latest security software and solutions have still not been able...
-
Creating and Maintaining a Security Operations Center (SOC)
By Karthik Palanisamy On 15 Sep 2016In recent times organizations have realized that IT security cannot be treated as a surrogate function and it has started to get the respect it deserves. IT security as a whole and IT Security Operation centers, in particular, are getting...
-
Greatest GRC Challenges
By Sushilkumar Nahar On 18 Jul 2016We are in the threshold of interesting times where technology is radically changing the landscape individuals and organizations operate in. We live in times when a simple IoT device like a smartwatch can help gain access to confidential information. There...
Access Governance Cyber Security Governance & Risk Compliance Technology
Tag Cloud
Subscribe for blog updates