Talk to Our Experts  

Information Risk Management Blog

Pokemon GO - Security lessons you just cannot afford to miss !

[fa icon="calendar'] Jul 15, 2016 5:41:46 AM / by Anupam Bonanthaya posted in Application security, Security, Digital Security, Pokemon Go

[fa icon="comment"] 1 Comment

This week in technology has been disruptive to say the least !

Pokémon GO, a location-based augmented reality mobile game has broken all previous records.

The mobile app has become so popular that it has become a social media phenomenon.  

So much that it is something that has changed and united the world for once. Now we all have a reason to believe that this game can solve all our problems !

Not the gaming kinds? It is still worth paying attention because it impacts all of us. Read on to know how...

Read More [fa icon="long-arrow-right"]

10 Ways CIOs & CISOs Can Beat Talent Crunch in Information Security

[fa icon="calendar'] Jun 15, 2016 2:18:12 AM / by Anupam Bonanthaya posted in Cybersecurity, Information security, Security, talent, SOC, security analytics, security services, hiring, infosec, managed security

[fa icon="comment"] 0 Comments


Information Security has jumped 33% to become Top-3 Priority for IT Executives in 2016. Now with the increasing importance of information security to organizations, the biggest hurdle is no longer buy-in from the board or even the budget $ - It is the "availability of talent" !

Information Security professionals are on the top when it comes to talent crunch. In this article I will cover 10 ways to deal with the talent shortage you are facing today. 

Read More [fa icon="long-arrow-right"]

13 Different Phishing Tactics and 1 Way to Prevent It

[fa icon="calendar'] Apr 20, 2016 1:14:51 AM / by Anupam Bonanthaya posted in Social engineering (security), fail-rate, Cyber Security, hackers, databreach, fall-rate, Information security, Malware, Vulnerability management, Security Trends, ransomware, Security, phishing, hacking, infosec

[fa icon="comment"] 2 Comments

 

Phishing Attacks are no longer that TOO GOOD TO BELIEVE - you have won a Million $$ jackpot kind of emails from strangers that easily stands out from your otherwise mundane life.

Today, phishing emails have got sophisticated. It is called spear phishing where the attacker tries to "custom-write" the emails to make it believable to you. They try to copy our (normal) life, and that's where it gets interesting and scary at the same time.

23% of recipients now open phishing emails and 11% click on attachments. and nearly 50% of this happens within 60-minutes of the attack !

- 2015 Data Breach Investigations Report (DBIR group)

Let me share a personal experience.

Read More [fa icon="long-arrow-right"]

How can Internet of Things (IoT) Not become a pain-in-the-a$$ from a cyber security perspective?

[fa icon="calendar'] Mar 30, 2016 3:38:06 AM / by Avinash Sinha posted in Privacy, Cybersecurity, IoT, Cyber Security, Internet of Things, Information security, Mobile Security, Security, cyberthreat

[fa icon="comment"] 5 Comments

Internet of Things is as enticing to hackers, as it is to consumers like you and me!

Read More [fa icon="long-arrow-right"]

30-Sec Guide: How to save from DROWNing?

[fa icon="calendar'] Mar 28, 2016 8:35:26 AM / by Naresh T A posted in Cyber Security, DROWN, CVE 2016-0800, Information security, Vulnerability management, Security, CVE

[fa icon="comment"] 0 Comments

 

Read More [fa icon="long-arrow-right"]

Managing Risk of Privileged Access and Activity Management

[fa icon="calendar'] Jul 26, 2011 6:32:55 AM / by lfxvideoblog posted in Business, Information technology, Risk management, Security, Identity and Access, Access Management

[fa icon="comment"] 0 Comments

The Problem
As organizations continue to leverage IT systems to support their businesses, the requirement of managing privileged users is rapidly emerging. Privileged IDs are the in-built system accounts within applications, operating systems, and databases. Additionally, user accounts that are created for administration of systems are also privileged IDs.
These IDs have higher and generally unrestricted authority associated with them to allow efficient system maintenance. As a side effect, these IDs can also be used to make widespread changes to the business systems.

Read More [fa icon="long-arrow-right"]

Aujas Opens New Office in California to Focus on Global Growth

[fa icon="calendar'] Jun 30, 2011 8:08:55 AM / by lfxvideoblog posted in Business, Risk management, Consultants, Security, Identity management

[fa icon="comment"] 0 Comments

Sameer Shelke, Co-founder, CTO and COO moves to US

Read More [fa icon="long-arrow-right"]

Aujas among the Most-Requested Information Risk / IT Security Firms at 2011 CIO & IT Security Forum

[fa icon="calendar'] Jun 20, 2011 4:49:12 AM / by lfxvideoblog posted in Secure Development, Risk management, Consultants, Social Engineering, Information security, Security, Computer security

[fa icon="comment"] 0 Comments

For Immediate Release

Read More [fa icon="long-arrow-right"]

Amazon EC2 Failures Are a Wakeup Call for Cloud Customers

[fa icon="calendar'] Apr 27, 2011 7:36:59 AM / by lfxvideoblog posted in Cloud Security, Service level agreement, Amazon EC2, Risk management, Cloud computing, Data Protection, Data loss, Security

[fa icon="comment"] 0 Comments

Read More [fa icon="long-arrow-right"]

The Business Case for Secure Development Lifecycle

[fa icon="calendar'] Apr 11, 2011 9:34:14 AM / by lfxvideoblog posted in Secure Development, Application security, Risk management, Vulnerability management, Secure Development Lifecycle, SDL, Security, Microsoft, Software development process

[fa icon="comment"] 0 Comments

Software is integral to business operations for most organizations. Unfortunately, the increasingly indispensable nature of software-based systems has also made them high-value targets for cyber crime.

Read More [fa icon="long-arrow-right"]
     

Other Popular Posts

Subscribe

Case Studies