Agriculture Insurance Company of India Ltd. (AIC) provides crop insurance coverage to 2.4 crore farmers annually, 86% of whom belong to the small and marginal category. To balance the twin challenge of crop insurance business, viz. reaching the remot
All Posts (2226)
I am highly excited to tell you the most exciting event and all the buzz of Annual Summit is back !
Further more I am more excited because now is the time when we will receive your innovation, those billions of papers and the most exciting hacks of
These days’ web applications are under siege. Commercially motivated Hackers, bots, and fraudsters are attacking around the clock, attempting to steal data, disrupt access, and commit fraud which today’s next generation firewall, IPS and other networ
FIFA world cup fever is on, filled with flying goals, penalty, corner shots and even bites marks. Not to mention it also teaches a lot of leadership lessons that helps connects and inspire your team. The topic of leadership from sports world is commo
The Data Leak Prevention Project was rolled out in Lanco Infratech Ltd
- To protect its proprietary assets and business data against any loss or leakage
- To meet regulatory requirements as per the segment of industry.
- To increase awareness amongst the
For many organizations the success or failure of IT initiatives is predicated on the selection of the appropriate technology vendor. Despite the critical nature of this process, many organizations underestimate the time and effort it takes to make a
PCI DSS – Stringent but Exhilarating to Implement (Project PCI DSS Implementation & Certification)
PCI DSS stand for Payment Card Industry Data Security Standard is a robust, comprehensive, technology driven, transparent, explicit standard to enhance
How to Say “NO”
Why did I say, “Yes” when I really wanted to say No? You ‘d probably be asking this question every time you agree to another task. Even though you do not have time or resources to do something but you commit to another one. For example
The most important question every CISO or CIO concerns about optimization and efficiency around process with minimal security incident (to make a close to zero). This often leads to comparison with peers on "How are we doing as an organization?”, “Wh
Customer in Dilemma with Current Business Trends around security-Every business runs on some basic trust. In today’s digital world, Compliance and standard are the enablers to achieve security along with optimized performance. Every service company
What I found interesting in this report, was the numbers on increasing DDOS attacks. Recent DOS & DDOS attacks on EverNote and Feedly have left us thinking. EverNote once got to know how dependent we humans are on them. It was assumed that such traf
Did You Know Applications with Highest Malware Activity are in Unknown-UDP ?Tweet this
>>Click here to Download How Unknown UDP Hosts Most Malware
Analyzing Application Threat Landscape Today-
- 94% of all vulnerability exploit logs we observe
Fundamentally we associate branding with bragging ,thus embarrassment. Rather branding is what others think of you, a response to the stimulus you provide. Adityanath Jha(CEO Crayon Pictures, Former Global Head of Branding at infosys) shows a comp
Relevant Security Trends and CISO Challenges in Europe by Don Lee, nRuns Germany
WATCH the complete ppt here.
>> Liked the ppt? Then click here to share this on google+.
(Read more:)
WATCH the complete video here.
This exclusive brief from Enterprise Strategy Group (ESG) outlines 4 key strategies for reducing the risk of advanced, targeted threats with next-generation security.
What will you learn in the paper:
- How the malware threat landscape is becoming mor
Can small hospitals pave the way to smart outcomes for larger hospitals…and can working together benefit both organizations and improve quality and patient outcome?
In today's reality of cost reduction, increased regulatory requirements, new technolog
The case for making dashboards; clinical and business; providing real-time and actionable information goes beyond the traditional advantages. Do it right and you get the opportunity to shape the organization from the ground up!!!!
Making Actionable Da
We are safe, checking our software's for fallacy, for hacker's tricks. However we never think that the machine we run could be malicious itself. Their could be havoc if so happened, Prof. Indranil Sengupta(IIT-kgp) enlightens us about such threat and
Cybercrime and espionage have cost companies over $500 Billionhttp://ctt.ec/12Ga3+" width="33" height="30" />in lost IP and untold lost jobs and productivity. The term ‘Advanced Persistent Threat’ was originally used by US Air Force security analysts
The next-generation firewall is well defined by Gartner as something new and enterprise-focused “incorporating full-stack inspection to support intrusion prevention, application-level inspection and granular policy control” .
Most network security ve
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)