Threat Management
-
Why SMBs are Just as Vulnerable to Cyber Attacks as Large Organisations
By Isaac George On 2 May 2016Isaac George, SVP and UK Regional Head at Happiest Minds has outline why small businesses are just as vulnerable when it comes to cyber attacks as larger ones. “In 2012, there were 300 times more cyber attacks on small businesses...
-
Of Honeypots, Decoys and Red Herrings
By Manoj Rai On 9 Feb 2016A look at cyber- threats The number of apps on your phone is directly proportional to how tech-savvy you can be. Ask any millennial and they will “app” a problem for you. Want to find your lost keys? Want to...
Cyber Security Cyber Threat Intelligence Security Threat Management
-
Network Security: A Key Imperative
By Raghuram Gorur On 20 Jan 2016Network security refers to the set of activities or measures taken to protect your office/ company network and ensure network threat management and remediation. Network security ensures that a network is protected while sending, receiving and storing data and identifies...
Access Governance Cyber Security Infrastructure Security Threat Management
-
The Growing Need For Enterprise Security
By Prasenjit saha On 21 Jul 2015The coverage of enterprise security is constantly being redefined on account of globalization and blurring boundaries of Big Data. However, on a broad level, it still comprises of the four key disciplines of information security, business security, physical security and...
-
Mobile App Security – Emerging Threat Landscape
By Manoj Rai On 8 Jul 2015Mobile apps have been increasingly gaining ground in the communication industry. Enterprises are rapidly adopting innovative mobile applications to transform their business capabilities as the mobile presence is critical for businesses to attract, retain and communicate with customers; it has...
Tag Cloud
Subscribe for blog updates