The use of smart phones to access sensitive corporate information away from the office is creating huge security gaps for enterprises. Smart phones are being used to access company mails and applications. Atleast one major breach involving theft of application code has been attributed to malware from smart phones. So how do we benefit from the technology while addressing the risks Continue reading “Smart Phones – Convenience or Threat?”
Log Management and Intelligence-LMI
Introduction
LMI is a governance enabler. Log data is no longer just the domain of technical personnel (traditionally used for trouble shooting). Log data is no longer just an IT asset and it is a corporate and business asset. It is used extensively by both management and external parties (auditor, forensic investigators) and hence has gained executive level visibility. In this post we look at the new approach to log management.
Information Technology Act – Offences & Penalties
This article summarizes the key offences pointed out in the Information Technology Act, 2000 and includes amendments made in the year 2008.
Continue reading “Information Technology Act – Offences & Penalties”
Excel shortcuts
Knowing these excel shortcuts takes you a long way in saving your valuable time while working with MS Excel.
An introduction to SOX compliance
Sarbanes Oxley Act also known as SOX was enacted in the year 2002 in the United States in response to various corporate scams. The objective of the enactment has been to protect the shareholders and the general public from accounting errors and fraudulent business practices. The Act is administered by the Securities Exchange Commission and is applicable to public companies.
Asymmetric Encryption Rules Made Simple
Asymmetric encryption rules seem to confuse people as to when to use a private or a public key and for what purpose. Given below is a table which gives in lucid form of what key to use, when to use and for what purpose.
A list of major security breaches of 2009
As we begin a new year, I thought it would be a good time to reflect upon some major information security breaches of 2009. The list of the organizations involved makes this list very interesting. What makes this list even more interesting is the analysis of the breach- which indicates that the incidents could have been averted by adopting some fundamental security best practices.
Continue reading “A list of major security breaches of 2009”
Make your Windows XP Secure … and faster
While Windows 7 is getting a rave review (unlike Vista) and more and more users are migrating to Windows 7, Windows XP continues to be prevalent. So as 2010 rings in, here are some tips and tweaks to make your Windows XP secure and faster.
Security Resolutions for 2010
What the Information Security manager should aim for
Tech Terminology Demystified – 3G
There is a lot of confusion on what constitutes a 3G technology.
