All Posts (2199)

Sort by

Compliance and Government Regulations

8669796452?profile=originalDue to financial implications caused by several recent high-profile data leakage incidents,enterprises are facing increasing pressure for implementation of stringent norms pertaining to governance and compliance reporting. Today, adhering to governme

Read more…
Views: 130
Comments: 0

Tips for Vendor Management

8669799257?profile=originalOne of the most important functionality which we do in our day to day work is Vendor Management,or should I say how to do it effectively. Here are a few tips which I would recommend and if needed you can add as well:

1.Always do a thorough check of th

Read more…
Views: 225
Comments: 2

BYOD Security

Does anybody succesfully implemented any BYOD Security Policy in his/her organization? Can he / she share the implemented policy and methodology / techniques / technology and challenges he / she faced ?

Read more…

Top Security Threats 2013

Keeping current with the latest threat trends can improve the effectiveness of existing security solutions as it helps to identify and prioritize security gaps that may require new approaches and more innovative strategies.

 

Key Findings:

  • Web Secur
Read more…
Views: 658
Comments: 0

7 Steps to stress free management

I am writing below a very actionable and minimalistic approach to stress free management.7 Steps to stress free management
A few goals which I had in my mind while writing it down was as follows:
  • Simple and Easy to adopt
  • Minimalistic i.e. you cannot drop anything out of these steps to
Read more…
Views: 371
Comments: 0