Information Security

iPhone State Sponsored Attackers Alert

As we witnessed in last couple of days, the way Opposition Leaders in Bharat made hue and Cry over the Apple Security Alert on probable State Sponsored Hacking, it was a real comic time for those who have been working the Information Security field. Now, when we look at the specific feature of Apple’s iPhone, …

Uber Hacks and Risk Management

The recent news about the live streaming of the unnerving passengers by an Uber/Lyft driver in the St. Louis area coupled with the Fraudulent “Extra Service” claims by the Uber Drivers in Miami area have certainly raised a concern on the Privacy and the Credit Card Frauds. Both the cases have not raised much support …

Experian Hack

It has been almost a month that Experian reported a breach in which 15 million T-mobile customer accounts were said to be compromised. The information included names, addresses, email ids, social security numbers and few more details of the T-mobile customers in USA. Though Experian was quick to react before the information could have been misused …

Indian National Encryption Policy

It is interesting to note that the Government of India’s Department of Engineering and Information Technology has issued National Encryption Policy for public comment.  And today the first addendum for the same has been issued for the people to refer to.  However, when it comes to the overall policy, it has been left out pretty …

Seamless & Transparent Compliance & Security operations

Information Security and IT operations generally do not go hand in hand or I rather make a not so controversial statement that IT Operations Folks generally don’t like Information Security Folks for they see the Information security folks to be the Show Stoppers.  The way I have witnessed it in my career, I have had …

$45 Million Heist with Prepaid Card Duplication: Lessons Learned

In my previous post “$45 Million Heist with Prepaid Card Duplication“, I had highlighted the questions that creep up in our mind as general readers or followers of the news.  Those questions are basically something that need to be dealt with or answered for a meaningful conclusion of the investigation. However, from the Risk Management …

IT Outsourcing Decision Concerns -II

Loss of Control By far and the foremost inherent risk of outsourcing is the “Loss of Control” on the outsource process. While outsourcing the IT Security processes, this at times can prove to be the worst nightmare for the organization’s management. The most common of the concerns, triggered by the decision to outsource lies with …

Driving Factors for Information Security

Information Security has become the need for survival of the Business today. Irrespective of the Geographic Location or Industry sector, following could be identified as the common Driving factors for the Information Security – Information Security Threats and Risks Any information system usage or implementation may be a target for range of serious threats, including …

Principles of Information Security

Information Security has three basic principles commonly referred to as the CIA Triad of Information Security (i.e. Confidentiality, Integrity and Availability). These principles include standards, conventions and mechanisms that form the basis for defining and implementing security controls and practices. In addition to the base principles (i.e. confidentiality, availability and integrity), there are the few …