With the advent of Mobile Platforms, the biggest challenge that parents face is to restrict the kids from accessing vulnerable sites or say malware that may be hosted on the “Malicious Sites.” Though more or less the Kids face same kind of threats as the adults where they can be susceptible to malware, viruses, trojans …
PCI-DSS and requirement of Risk Assessment have a very close relationship. In effect PCI-DSS has specified the requirement for an annual risk assessment as per the control 12.2 and has mentioned the requirement under guidance for requirement 10.6.2 and Testing Procedures for requirement 11.5. PCI-DSS requirement 12.2 establishes the requirement for implementing a risk assessment …
Data Privacy in today’s world has crossed over from a requirement dependent on one agency or organization to be the global phenomenon. Today the data traverses across the countries as well as continents at the speed unimaginable in past. In a flash of second, the data originating from EU may be transferred to China and …
Unique Identification Authority of India (UIDAI) data center in Bangalore is reported to have got a cover of 65 star guards from multi-skilled security agency, the Central Industrial Security Force (CISF) – Your identity is guarded by 65 armed men (article on times of India). It indeed is a commendable step by the authorities, but …
Clause A.10.10 revolves around monitoring with the objective of detecting unauthorized information processing activities. Though there can be many ways to do the same, automation is the most preferred way to do so owing to the size and amount of logged data. It becomes humanly insane task to review logs manually. But when I …
The days when we used to make payments with hard cash are long gone. With the advent of new age technology, Bank cards (Debit/Credit) and the Internet Banking, we all do go for convenience payment sitting in the comfort of our home and / or office. The payments made in this way are something that …
In my previous post “$45 Million Heist with Prepaid Card Duplication“, I had highlighted the questions that creep up in our mind as general readers or followers of the news. Those questions are basically something that need to be dealt with or answered for a meaningful conclusion of the investigation. However, from the Risk Management …
Quoted Article:Government unveils roadmap for use of new internet addresses This is one of the most awaited change that the government is now rolling out. Though late in the race, still better as this would kick off the next level of development and would result in far reaching results. With this change, the reach of …
The recent developments that hackers are adopting to target the systems are pretty interesting. The Batchwiper as detected by the Iranian CERT and the Trojan as reported with evade technology are the two recent developments. The Batch Wiper though can be contained with certain precautionary measures, but the Trojan with evade technology would certainly be something that …
Post my previous post, I received a mail from one of my Friend around SSAE 16 / ISAE 3402 and I provided the reply to the friend and then thought, why not share the explanation with the wider Audiences for the good. May be if somewhere I made a mistake, I would also get to …