That smartphone in your pocket – or your tablet or laptop – contains significant information about you and your friends and family – contact numbers, photos, location and more. Your mobile devices need to be protected. Take the following security precautions and enjoy the conveniences of technology with peace of mind while you are on […]

Safety Tips for Your Mobile Devices

Updated: Comments on Draft National Encryption Policy
Imagine, the Government issues a policy which states that you may lock your house but you have to leave the keys outside the house, at all times. The Government appointed officials may then at any time visit your house to see what’s going on inside. You have no choice but to comply. What would your […]

Cyber Security Awareness 2.0
When dealing with Cyber Security, it is often said that people are the weakest links. One vulnerable and gullible employee is all it takes to infiltrate into the company network. However, cyber security managers need to ask themselves this question, are people really the problem here? The challenge for cyber security managers is that they […]

YCSC QnA with Keith Pradeep Fernandez
About Keith Pradeep Fernandez Keith, CIPP/IT, CISSP, CISA, CISP, is a seasoned Security and Privacy Professional with a rich experience of over 15+ years in various geographies (US, Australia, Middle East, India) and industries like IT Consulting, Internet and telecom Service Providers and software development firms including a fortune 500 client. He is currently working as […]

Online Safety Tips for Golden Agers
Recently, I came across a question on Quora wherein a gentleman, claiming to be 80 years of age, had asked for some advice on how to learn server side languages. In fact, he aimed to beat Mark Zuckerberg and Jack Dorsy before he departs for good. Frankly, I was a bit surprised by this because I […]

The Library Freedom Project
The other day I was researching a topic which was somewhat controversial in nature. My search for more information took me to the local library. I asked the librarian about the section where I could find books on that topic. First he gave me a suspicious look and then directed me towards a computer through […]

Information Security: Proper Heads for the Hats
Last 10 years saw India becoming one of the biggest pool of skilled IT professionals. While this has largely been into IT services sector (software & infrastructure primarily), Indian profiles in world’s biggest product companies is not something unheard of. And while world looks at Social, Mobile, Analytics and Cloud (SMAC) as the next big […]

Let there be no more MMS Scandals
MMS. What was the first thing that came to your mind after reading MMS? More often than not it’s sex scandals. Like Google has become a synonymous for search, MMS has become a synonymous for unauthorized capture and/or release of a video clip containing intimate acts, usually sexual in nature, aka Sex Scandals. It’s not only illegal, […]

CSX Fundamentals: Everything You Need to Know
Last year, ISACA launched a new series of certifications, focused on Cyber Security, called CyberSecurity Nexus (CSX) Certifications. This series contains a total of eight certifications leading to either CSX Expert or CISM. Image Source: Isaca.org CSX Fundamentals is the first certification in this series. I started my certification path with it and would like to […]

Social-Engineer Toolkit: An Introduction
Long back, I read a book called The Art of Intrusion by Kevin Mitnick, in which he explained some of his successful techniques to infiltrate into an organization’s network. Among them was one that he employed the most, Social Engineering. Social Engineering can be defined as a psychological play on people in order to lead them […]
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- 9
- Next Page »