-
Of Honeypots, Decoys and Red Herrings
By Manoj Rai On 9 Feb 2016A look at cyber- threats The number of apps on your phone is directly proportional to how tech-savvy you can be. Ask any millennial and they will “app” a problem for you. Want to find your lost keys? Want to...
Cyber Security Cyber Threat Intelligence Security Threat Management
-
How Do You Solve a Problem Like Cyber Security?
By Manoj Rai On 7 Dec 2015Happiest Minds UK discusses the new-age deception technologies UK businesses should adopt to bolster their cyber-security defences The recent TalkTalk cyber-security breach has brought the issue of security firmly back into the public’s psyche and has put both government and...
-
Mobile App Security – Emerging Threat Landscape
By Manoj Rai On 8 Jul 2015Mobile apps have been increasingly gaining ground in the communication industry. Enterprises are rapidly adopting innovative mobile applications to transform their business capabilities as the mobile presence is critical for businesses to attract, retain and communicate with customers; it has...
-
Static Code Analysis for Enterprise Applications
By Manoj Rai On 6 Jul 2015The increase in adoption of Social, Mobile, Analytics, and Cloud (SMAC) technologies and growth in data volumes has led to increased concerns about data security. With large enterprises building or deploying new applications using public cloud platforms, there are doubts...
-
Why it is critical to pen test your ERP system
By Manoj Rai On 6 Jul 2015An ERP system is really at the heart of any organization. It enables and facilitates all critical business processes human resources management, financial planning, product management, and more. More importantly, it holds all the data critical to the organization financial...
Tag Cloud
Subscribe for blog updates