As we witnessed in last couple of days, the way Opposition Leaders in Bharat made hue and Cry over the Apple Security Alert on probable State Sponsored Hacking, it was a real comic time for those who have been working the Information Security field. Now, when we look at the specific feature of Apple’s iPhone, …
The recent news about the live streaming of the unnerving passengers by an Uber/Lyft driver in the St. Louis area coupled with the Fraudulent “Extra Service” claims by the Uber Drivers in Miami area have certainly raised a concern on the Privacy and the Credit Card Frauds. Both the cases have not raised much support …
Almost 2 years from the time we all witnessed the Experian Data Breach, we are at the stage where we all are informed about the Equifax Data Breach. Now, with almost half of the US Consumers are probably hit by this breach, Equifax made a statement that not all information was compromised. Well, if Name, …
It has been almost a month that Experian reported a breach in which 15 million T-mobile customer accounts were said to be compromised. The information included names, addresses, email ids, social security numbers and few more details of the T-mobile customers in USA. Though Experian was quick to react before the information could have been misused …
It is interesting to note that the Government of India’s Department of Engineering and Information Technology has issued National Encryption Policy for public comment. And today the first addendum for the same has been issued for the people to refer to. However, when it comes to the overall policy, it has been left out pretty …
Information Security and IT operations generally do not go hand in hand or I rather make a not so controversial statement that IT Operations Folks generally don’t like Information Security Folks for they see the Information security folks to be the Show Stoppers. The way I have witnessed it in my career, I have had …
In my previous post “$45 Million Heist with Prepaid Card Duplication“, I had highlighted the questions that creep up in our mind as general readers or followers of the news. Those questions are basically something that need to be dealt with or answered for a meaningful conclusion of the investigation. However, from the Risk Management …
Loss of Control By far and the foremost inherent risk of outsourcing is the “Loss of Control” on the outsource process. While outsourcing the IT Security processes, this at times can prove to be the worst nightmare for the organization’s management. The most common of the concerns, triggered by the decision to outsource lies with …
Information Security has become the need for survival of the Business today. Irrespective of the Geographic Location or Industry sector, following could be identified as the common Driving factors for the Information Security – Information Security Threats and Risks Any information system usage or implementation may be a target for range of serious threats, including …
Information Security has three basic principles commonly referred to as the CIA Triad of Information Security (i.e. Confidentiality, Integrity and Availability). These principles include standards, conventions and mechanisms that form the basis for defining and implementing security controls and practices. In addition to the base principles (i.e. confidentiality, availability and integrity), there are the few …