The popularity of cloud computing and BYOD really brought information security to the forefront. The intruders also got smarter and more intelligent in finding new ways and...
Vulnerability Assessment is also sometimes referred to as Vulnerability Analysis. Vulnerability Assessment is a part of vulnerability testing also known as VAPT. VAPT comprises of Vulnerability Assessment...
IAM is an acronym for Identity and Access Management. Identity and Access Management is an information security framework which focuses on the security of the digital identities...
People had Yahoo and Hotmail account during the initial days of the early 2000’s when people were exposed to Internet. Very few number of people used any...
The more online accounts you have, the more you become a slave of the constant password management of each for all your accounts. Every now and then...
Preface Back in October 2014, Gartner said in one of their reports that 40 Percent of U.S. Employees of Large Enterprises Use Personally Owned Devices for Work; and according...
One of the most growing concerns for any organization in the security sector is Identity and Access Management. According to CEO & Chairman Nelson Cicchitto of Avatier...
Cloud computing in Information Technology has now most assuredly reached the age where it has begun to penetrate to a lot of home users. In most cases,...
In its latest Bug Bounty Program report, Facebook has confirmed that it has fixed 61 eligible bugs which were categorized as High Severity, which was 49% more...
Walk in to a group of teenagers or youngsters today, you will notice atleast one of them who is disinterested in the ongoing discussions, but more interested...
Update (5th April, 2014) – Microsoft provided a patch last week for all the Windows versions, in order to fix the issue . Microsoft also provided patch...