(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
RSA expo floor is the madness that we love. The fringes are more interesting to me than the center. If you want to spot the new go to the fringes. We tried to have a bit of fun this year.
How we did the analysis?
We took pics of booths all around the e
RSA expo floor is the madness that we love. The fringes are more interesting to me than the center. If you want to spot the new go to the fringes. We tried to have a bit of fun this year by analyzing the buzzwords as seen in the expo floor.
How we di
I am on my way back from RSA Conference 2015 @ San Francisco. It is a cloudy day at New York. Perfect day to write a quick blog. Here's my interpretation of Amit Yoran's talk with a bit of my thoughts poured into it.
Taller walls won't solve the probl
I am on my way back from RSA Conference 2015 @ San Francisco. It is a cloudy day at New York. Perfect day to write a quick blog. Here's my interpretation of Amit Yoran's talk with a bit of my thoughts poured into it.
Taller walls won't solve the pro
The effectiveness of cyber security portfolio of an enterprise depends on multiple factors. Efficient Vulnerability Management Program is one of the critical parameters to be considered. Considering the dynamic nature of the attack vectors, it is im
SAP has released the monthly critical patch update for April 2015. This patch update closes a lot of vulnerabilities in SAP products. Most of them are potential information disclosure vulnerabilities.
The most critical issues found by other researcher
SAP Mobile Platform Security: Introduction
Mobile devices are actively integrated into business processes. Companies have more and more business applications and mobile devices. Employees increasingly bring their own equipment to the workplace (BYOD
Dear Colleagues,
“ Balance Checking Software App “ is an software application is doing rounds on WhatsApp purportedly to facilitate checking of balance in customers' bank accounts. The Reserve Bank of India (RBI) on Saturday (11th April 2015)warned th
Setting up an Security Incident Response Team (SIRT) is a challenging job.
Things To Keep In Mind:
1.Organization's IT assets and required security measures
2.Log of earlier attacks gives an idea on vulnerable assets and attacks areas
3.Organization'
Each application has several security settings that do not fit into any of the critical issues groups mentioned in our series of articles.Among such settings there are both standard settings (such as password length or the number of attempts given to
The developers of the free & hugely popular encryption program dropped a bombshell at the end of May when they abruptly abandoned the project. The top of their website was emblazoned with the following message in red: "WARNING: Using our Software is
With this article we are starting a new series of guidelines describing some basic assessment procedures one can carry out on various business applications that would help security professionals to