Data Privacy in today’s world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon. Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of second, the data originating from EU may be transferred to China and …
Unique Identification Authority of India (UIDAI) data center in Bangalore is reported to have got a cover of 65 star guards from multi-skilled security agency, the Central Industrial Security Force (CISF) – Your identity is guarded by 65 armed men (article on times of India). It indeed is a commendable step by the authorities, but …
Clause A.10.10 revolves around monitoring with the objective of detecting unauthorized information processing activities. Though there can be many ways to do the same, automation is the most preferred way to do so owing to the size and amount of logged data. It becomes humanly insane task to review logs manually. But when I …
The days when we used to make payments with hard cash are long gone. With the advent of new age technology, Bank cards (Debit/Credit) and the Internet Banking, we all do go for convenience payment sitting in the comfort of our home and / or office. The payments made in this way are something that …
In my previous post “$45 Million Heist with Prepaid Card Duplication“, I had highlighted the questions that creep up in our mind as general readers or followers of the news. Those questions are basically something that need to be dealt with or answered for a meaningful conclusion of the investigation. However, from the Risk Management …
Quoted Article:Government unveils roadmap for use of new internet addresses This is one of the most awaited change that the government is now rolling out. Though late in the race, still better as this would kick off the next level of development and would result in far reaching results. With this change, the reach of …
The recent developments that hackers are adopting to target the systems are pretty interesting. The Batchwiper as detected by the Iranian CERT and the Trojan as reported with evade technology are the two recent developments. The Batch Wiper though can be contained with certain precautionary measures, but the Trojan with evade technology would certainly be something that …
Post my previous post, I received a mail from one of my Friend around SSAE 16 / ISAE 3402 and I provided the reply to the friend and then thought, why not share the explanation with the wider Audiences for the good. May be if somewhere I made a mistake, I would also get to …
Pretty recently was indulged in a discussion around the need of Certification to the Need of Assurance. It was a pretty interesting discussion that led me to evaluate the conceptions and misconceptions that prevail in the industry. I thought why not share it with the rest of the folks who would like to participate in …
As I wrote the previous Post – BYOD Program & Controls Requirement I received the comment on WFH, but I am certainly not covering that in this article, as that is a separate topic of discussion. What is more interesting that broke out as a discussion point with a colleague over a cup of coffee. The discussion …