We explored the dilemma of an IT security manager at a policy level on whether a company owned, but personally enabled ( COPE) approach makes sense. Marketing researcher Gartner predicts that almost 40% of the companies rely on BYOD, and plan to completely move away from owning devices in another… read more →
Digital economy is about being online – both mobile and the web applications making the cut. We covered the near term impact of risk modeling and management, two-factor authentication, cyber-intelligence and analysis, in our last blog. When we look at the mid-term solutions, they are influenced by few factors. Firstly,… read more →
Most mobile users have made mobiles part of their life needs. Now, the mobile phone is the call and message device. It is your lifeline. It is your entertainment, games console, location finder, alarm clock, GPS device, health monitoring device, scheduler, and email device – add the other applications, mobile… read more →
Cyber security seems to be heading for long terms challenges these days. In the last one decade, the conventional boundaries of enterprise have broken and dissolved. Enterprises need to now deal with the extended eco-system including customers, partners, suppliers, employees, contractors and finally end-consumers of the product and service. Digital… read more →
BYOS – Adding a new dimension to Enterprise IT Security As folks in the Enterprise IT security fraternity, we know that Bring Your Own Device allows employees the freedom to purchase their own devices like tablets or smart phones which they can use to interact and collaborate with others, approve… read more →
Fake Social Profiles – Social Engineering Trojans that attack Enterprises Mark Hughes is an attractive and middle aged professional who has an air about him of having been there and done that and on LinkedIn profiles has more than a thousand connections that are the who’s who of the industry… read more →
OWASP has recently published ‘OWASP Testing Guide 4.0’. The OWASP Testing Guide version 4 improves on version 3 in three ways: This version of the Testing Guide integrates with the two other flagship OWASP documentation products: the Developers Guide and the Code Review Guide. To achieve this we aligned the… read more →