Card Skimming has become one of the biggest threats in payment card space. Lingering magnetic-stripe technology, rather than the advanced EMV chip standard used in Europe and elsewhere, is part of the problem. Continue reading “Emerging technologies to improve card security”
Mobile Security Software Suite – New Launches
Mobile security concerns have dominated security discussions of late. Conventional threats have also been increasingly applied for mobile based appliances and security companies have introduced products catering to this space. Continue reading “Mobile Security Software Suite – New Launches”
Firesheep is available
Accessing your accounts in public Wi-fi spots such as Airports and hotels has become more riskier with the launch of Firesheep. Continue reading “Firesheep is available”
A Data Center View
When an enterprise is small in size the IT infrastructure consists of a server room with couple of low end servers, some networking devices and client PCs. But as the organization grows the IT infrastructure too grows in size. Medium to large scale enterprises have data centers of their own or outsource the data center (DC) operations to service providers who specialize in DC operations. In this article, let us have a peek into a typical data center and look at what components are deployed.
Major security bug fixed in Firefox
Auditing System Impact on Performance – Windows
A lot of questions are raised regarding the effect of auditing on the performance of systems.
Continue reading “Auditing System Impact on Performance – Windows”
Theft of information and electronic data overtakes physical theft
According to the latest edition of the Kroll Annual Global Fraud Report, theft of information and electronic data at global companies has overtaken physical theft of property and goods for the first time.
Continue reading “Theft of information and electronic data overtakes physical theft”
Display power point slides from your smartphone on a client’s video projector wirefree!!
Wi-Fi Direct makes it happen!!
Wi-Fi Direct, formerly known as Wi-Fi Peer-to-Peer, is a set of software protocols that allow Wi-Fi devices to talk to each other without the need for wireless access points (hot spots).
Tech Demystified: Blade Servers – The Cutting Edge
Business Model for Information Security – What is it all about?
The role of information security has not been clearly defined in many organizations and these organizations face challenges such as lack of senior management’s commitment to information security initiatives, poor security planning, integration issues between business goals and information security, issues relating to accountability for implementing, monitoring and reporting on information security and so on. Continue reading “Business Model for Information Security – What is it all about?”
