Information Security Risks

iPhone State Sponsored Attackers Alert

As we witnessed in last couple of days, the way Opposition Leaders in Bharat made hue and Cry over the Apple Security Alert on probable State Sponsored Hacking, it was a real comic time for those who have been working the Information Security field. Now, when we look at the specific feature of Apple’s iPhone, …

Need to Secure Private Information – Requirement in India

Unique Identification Authority of India (UIDAI) data center in Bangalore is reported to have got a cover of 65 star guards from multi-skilled security agency, the Central Industrial Security Force (CISF) – Your identity is guarded by 65 armed men (article on times of India). It indeed is a commendable step by the authorities, but …

BYOD Program & Controls Requirement – II

As I wrote the previous Post – BYOD Program & Controls Requirement I received the comment on WFH, but I am certainly not covering that in this article, as that is a separate topic of discussion. What is more interesting that broke out as a discussion point with a colleague over a cup of coffee.  The discussion …

BYOD Program & Controls Requirement

BYOD or Bring Your Own Device is the way organizations are planning to take.  The talk is going abuzz in the corporate world as it would help organizations reduce their IT budget and increase operational efficiency.  In my view it is not that bad an idea, but would require looking a bit deeper at the …

Driving Factors for Information Security

Information Security has become the need for survival of the Business today. Irrespective of the Geographic Location or Industry sector, following could be identified as the common Driving factors for the Information Security – Information Security Threats and Risks Any information system usage or implementation may be a target for range of serious threats, including …