Personal computers being used by the users at their home are the worst affected machines when there is a virus or worm outbreak. These machines are not the actual targets. Infact these machines are the escape goats for the malicious users for using them for a bigger and more severe attack on the target. The …
Month: August 2007
Information Security today is Governed by Regulations, Standards, Guidelines and Industry Best Practices. They provide for frameworks, methodologies and approaches to attain Information Security baselines. Compliance to any of them is just meeting these baselines, but there is more to be done over and above the compliance. Compliance achievement is something that holds importance with …
PCI-DSS compliance can be achieved with effective and efficient mapping of control requirements with either the ISO 27001 or the COBIT framework as already established and accepted across the world and industry segments. But whatever framework we follow for PCI-DSS Compliance, following steps must be followed in order to ensure that the compliance is being …
With PCI-DSS fast approaching its deadline for the compliance adherence, most of the organizations are putting their act together to meet the compliance requirements. But there lies a challenge to look for the right approach therein. The consultants/implementers/maintainers are often dwindling about what approach to take in this area. Various vendors are pitching for their …