The popularity of cloud computing and BYOD really brought information security to the forefront. The intruders also got smarter and more intelligent in finding new ways and...
Vulnerability Assessment is also sometimes referred to as Vulnerability Analysis. Vulnerability Assessment is a part of vulnerability testing also known as VAPT. VAPT comprises of Vulnerability Assessment...
IAM is an acronym for Identity and Access Management. Identity and Access Management is an information security framework which focuses on the security of the digital identities...
People had Yahoo and Hotmail account during the initial days of the early 2000’s when people were exposed to Internet. Very few number of people used any...
The more online accounts you have, the more you become a slave of the constant password management of each for all your accounts. Every now and then...
Preface Back in October 2014, Gartner said in one of their reports that 40 Percent of U.S. Employees of Large Enterprises Use Personally Owned Devices for Work; and according...
One of the most growing concerns for any organization in the security sector is Identity and Access Management. According to CEO & Chairman Nelson Cicchitto of Avatier...
In its latest Bug Bounty Program report, Facebook has confirmed that it has fixed 61 eligible bugs which were categorized as High Severity, which was 49% more...
Intel is reportedly working on Biometric technology in a software which it hopes will replace the use of passwords. The software being McAfee, which as we know...
Walk in to a group of teenagers or youngsters today, you will notice atleast one of them who is disinterested in the ongoing discussions, but more interested...
Update (5th April, 2014) – Microsoft provided a patch last week for all the Windows versions, in order to fix the issue . Microsoft also provided patch...
Situation for Target got from bad to worse over the weekend during the ongoing forensic investigation. New information came to light in this investigation, and Target has...
A new report released by NSS Labs, a security research and advisory company says Banks need to be more careful in authenticating the online banking customers when...
In the latest information security attack news, approximately 2 million accounts have been compromised. A Botnet using software controller named “Pony” was used for the attack and...
Microsoft announced yesterday they are bringing additional level of security to Office 365 early next year. This new service is called Office 365 Message Encryption. Thanks to...
Update: Microsoft has announced that the patch for zero day exploit found in Internet Explorer is ready and will be released Today (Nov 12th) at approximately 10:00...
Earlier this week, a common vulnerability exploit (CVE) was discovered in Microsoft office. However, many users were confused about which version of the Office software was vulnerable...
Apple yesterday released a statement about the questions that have been raised related to user information privacy and how they are dealing with it, trying to bring...