Trigger Warning – Abuse, Stalking, Death She runs through an endless corridor of darkness, confused and helpless. Her heartbeat racing, her mind on overdrive. Why would he? How could he have known? How did he access her information? Her text messages, images, contact details, chats, places where she had visited, recordings of her phone calls […]
Clubhouse and its exponential growth during COVID-19 Clubhouse is an invite-only audio-chat iPhone app founded by Paul Davison and Rohan Seth. It allows users to create groups for conversations, including podcasts, audio conferences, etc. Launched in April 2020, the application became popular during the COVID-19 pandemic, reaching 600,000 registered users in December 2020, which exploded […]
ELK Stack is a collection of three components – Elasticsearch, Logstash & Kibana Logstash – This component is responsible for processing incoming data. It takes input from different sources, executes different transformations and stores the results in Elasticsearch or other formats Elasticsearch – NoSQL database based on Apache Lucene’s search engine. Kibana – Web […]
Penetration Testing as per PCI DSS version 3.2 As per PCI DSS v3.2, Requirement 11.3 addresses penetration testing activity for organizations following PCI DSS compliance. The requirement is further divided into following sub requirements: Requirement 11.3.1: Conduct external penetration testing at least annually or after any significant change has occurred in organization’s environment Requirement 11.3.2: […]
Vendor Patches: Google Releases Security Update for Chrome Cisco Releases Security Update Oracle Releases Security Bulletin Apple Releases Multiple Security Updates Drupal Releases Security Advisory Security Breaches: Disney Playdom forums shut down following data breach Pokémon GO Creator’s Twitter Account Hacked North Korean hackers gain access to personal data of dozens of South Korean diplomats […]
From Our Blog: Data Privacy – An Introduction by Latha Sunderkrishnan (Senior Consultant) When companies and merchants use data or information that is provided or entrusted to them, this data should be used according to the agreed purposes. Companies must ensure data privacy because the information is an asset to the company. Privacy concerns exist […]
Starting out with enterprises equating information security with just having an antivirus, or a firewall, to cutting edge technologies are being adopted in security today – some uncommon even in more developed markets – the Indian Information Security domain has evolved. “We have come a long way from where the Indian journey in security started – […]
Objectives of IT legislation in India The Government of India enacted its Information Technology Act 2000 with the objectives stating officially as: “to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involve the use of alternatives to […]
The RBI constituted the Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds, which produced its report in January 2011. The Working Group was headed by Mr. G. Gopalakrishna and is popularly known as the Gopalakrishna Committee Report. The presentation below highlights some of the salient points, with special emphasis on […]
When we heard Khushbu Pratap’s name cropping up in Gartner’s explanation on its Magic Quadrants, we thought we would ask her about how her experience working at NII had been. Below is the unadulterated heart-taking-a-leap-of-joy response! My time at NII has been the most rewarding experience in my short professional history. I am talking from the time NII […]