Many a times we encounter situations where we find that certain Information Security Policy requirements and considerations are not in line with the Global Security Best Practices and they actually are not in-line with the Global Standards to that effect. But, the major mistake that we make at such a point is to take into …
In my previous post “$45 Million Heist with Prepaid Card Duplication“, I had highlighted the questions that creep up in our mind as general readers or followers of the news. Those questions are basically something that need to be dealt with or answered for a meaningful conclusion of the investigation. However, from the Risk Management …
Cloud Computing is the Buzz Word that has caught the lime light in recent years and it is indeed interesting to see where does it go from here? Will it be Hype or will it be a successful Marketing Gimmick by the Infrastructure Services Providers and the OEMs. There has been a lot written and …