Compliance Audit: Curse of Necessity.

In this series we will talk about different types of compliance like PCI-DSS, HIPPA, ISO 27001, SSAE 18, SAS 70, Safe Harbor and many more along with the details one should be aware of, processes to build up-implement-take follow up of, how to review them and much more.

Social Engineering

Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology.

CISSP Study Plan

If you are reading this, you already know the value of CISSP and are looking for a study plan and resources to refer.This post talks about study plan from an information security professional perspective in 2 months time frame along with the resources that you’ll need to do so. The objective of 2 months is assuming you already have good understanding of Information Security Concepts and are aware with the eight domains associated.

Hello world!

We are living in an era where technology is in the hands of toddlers, youngsters cannot live without it and the seniors who had not been exposed to internet are putting efforts to tame this digital beast or at least trying to get along with the smartphones & using them to their full potentials.