Patch Management is is one of the most critical activities in any organization’s security. Failure to achieve effective patching cadence can lead to vulnerability exploitation, financial and reputational damages.
A vulnerability assessment is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system.
Security Compliance Audit takes into account various security measures that are either point in time adherence or are to be maintained throughout the audit period.
security aims to protect digital data from attackers, from the unwanted actions of unauthorized users and accidental disclosure such as a cyber attack or a data breach.
This is an ongoing list of information security concepts, definitions and acronyms.
In this post we will go through the major sections of Indian Information Technology Act. Although this is a very high level overview, it will still help you to understand what all are the offense and what punishment can a culprit be sentenced if found guilty.
Although it is very important to train employees on best security practices and procedures, many organizations turn a deaf ear towards it and once they get breached or their compliance is revoked, they understand necessity and significance of security awareness training.
I would like to start with the flicks which amazingly portrayed Social Engineering Tantrums. The whole point behind giving a movie list in the beginning is simple – just to cast a spell of this amazing “Art of Deception”.
In this series we will talk about different types of compliance like PCI-DSS, HIPPA, ISO 27001, SSAE 18, SAS 70, Safe Harbor and many more along with the details one should be aware of, processes to build up-implement-take follow up of, how to review them and much more.
In order to build a secure organizational architecture various processes and norms are deployed such as policy implementations, Compliance Audits, Periodical Penetration testings, code security processes and much more.