As we witnessed in last couple of days, the way Opposition Leaders in Bharat made hue and Cry over the Apple Security Alert on probable State Sponsored Hacking, it was a real comic time for those who have been working the Information Security field. Now, when we look at the specific feature of Apple’s iPhone, …
The days when we used to make payments with hard cash are long gone. With the advent of new age technology, Bank cards (Debit/Credit) and the Internet Banking, we all do go for convenience payment sitting in the comfort of our home and / or office. The payments made in this way are something that …
Information Security Breach can be referred to as the compromise with Confidentiality of Data / Information with an Unauthorized and Unwarranted access. However a breach might not always result in Data Theft, but as the Information Guardian, the Information Security Team of an organization must vigilantly secure access to the Information Assets hosting/processing critical information including …