Data Security and Facebook

An online report published by CNET on September 4, 2019 identified that at least 419 million records  of phone numbers tied with Facebook accounts appeared in databases online. The report was based on the revelation by TechCrunch.  The exposure identified 133 million users from US alone and another 18 million and 50 million records from UK and Vietnam …

Uber Hacks and Risk Management

The recent news about the live streaming of the unnerving passengers by an Uber/Lyft driver in the St. Louis area coupled with the Fraudulent “Extra Service” claims by the Uber Drivers in Miami area have certainly raised a concern on the Privacy and the Credit Card Frauds. Both the cases have not raised much support …

Cyber Security Program – Need for All Inclusive Approach

Cyber Security Program the way I have often observed in various organization over the years, is lead with piecemeal approach. There is no holistic view or review of the same and the Cyber Security team, often to be counted on fingers, is left to fend the entire organization’s Information and Information Technology establishments. The other …

Experian Hack

It has been almost a month that Experian reported a breach in which 15 million T-mobile customer accounts were said to be compromised. The information included names, addresses, email ids, social security numbers and few more details of the T-mobile customers in USA. Though Experian was quick to react before the information could have been misused …

Compliance Management – Considerations

Many a times we encounter situations where we find that certain Information Security Policy requirements and considerations are not in line with the Global Security Best Practices and they actually are not in-line with the Global Standards to that effect. But, the major mistake that we make at such a point is to take into …

Indian National Encryption Policy

It is interesting to note that the Government of India’s Department of Engineering and Information Technology has issued National Encryption Policy for public comment.  And today the first addendum for the same has been issued for the people to refer to.  However, when it comes to the overall policy, it has been left out pretty …

Seamless & Transparent Compliance & Security operations

Information Security and IT operations generally do not go hand in hand or I rather make a not so controversial statement that IT Operations Folks generally don’t like Information Security Folks for they see the Information security folks to be the Show Stoppers.  The way I have witnessed it in my career, I have had …