Blog

GDPR Compliance using RSA Archer
         April 15, 2015

The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation in EU law on data protection and privacy for all individuals within the European Union. It focuses on protecting personal data and giving people control over their data across organizations under EU. Organizations are looking for different methods to be complaint with GD Read More...

One minute guide to GDPR Compliance (Infographic)
         April 15, 2015

We are a few days away from the implementation of Europe’s new privacy rule that is reshaping the internet. The General Data Protection Regulation (GDPR) is said to be the most important change in data privacy regulation in the past 20 years. The GDPR Compliance infographic will help answer some of the relevant and important questions around Read More...

Understanding DDoS attack and how to prevent them - Infographics
      April 15, 2015

Understanding DDoS attacks and how to prevent them - Infographicsn

Read More...

Part 1 : Governance Risk and Compliance
   April 15, 2015

The world as we know it is turning into an age of information. Information is flowing around everywhere by establishing deep roots and being more valuable. Organizations are facing issues in handling the flow of information. Organizations are now not bonded to just one entity but different entities tied up to form giant ones where information flow Read More...

War !!!!
      April 15, 2015

The world is moving into an age where information is costlier than fuel. Information is considered as the new driving factor of a whole new era to come. As the world moves to an age of information, countries are investing in making their cyberspace more secure.

Hackers are able to find the minute of vulnerabilities and exploit it to make Read More...

How Do You Securely Conduct Online Transactions
   April 15, 2015

When you start working for a security company, it's easy to get so afraid of doing anything online for fear of being watched, robbed and what not, that for the first few months you simply stop doing any online transaction, stare obsessively at your webcam wondering if it's been hacked and look for that green lock on all the websites you visit. As Read More...

Behind the job title: Information Security Consultant
   April 15, 2015

We all know who a doctor is! When we have a fever, headache or any other illness we rush towards the clinic and ask for medicines for a cure. Here's a classic example. You wake up one mo ing with a sore throat. The kind that makes you sound like a frog and feel much worse. You rush to the clinic, explain the scenario, and discuss the symptoms and Read More...

 1 2 >