Most of the organizations are either started using cloud services or migrating to the cloud. First and the most important decision-making point before migrating the applications to the cloud is, how this transformation will impact the data security and compliance to the applicable regulatory requirements to my business? Most of the prominent cloud service providers like Google (GCP), Amazon (AWS)…
Month: August 2017
Security Design Principles – A Quick Guide
There is old Indian fable about how an elephant looks like to the blind men in the room, the person who touched the trunk of elephant described it as a snake, the person who feels side perceived it as a wall, who touches the ears identified it as fan and story go on … A great many people like blind…
IoT Security Concerns for Consumer Devices & How to Protect It
Smart devices and appliances are part of our daily life, locking our homes, monitoring our fitness, lights, fridge, television sets, web cameras to name the few are connected to the internet and we can access these devices from anywhere. This includes your kid’s smart toys as well. These devices are known as Internet of the Things (IoT). These days you…
Security Features – AWS and Azure
The rapid changes in technology have profoundly changed how we interact, communicate and live our day to day life. This has also drastically changed the way business and governments are providing services to consumers and citizens. Inter connectedness and mobility has significantly changed the consumer expectations, regulators are trying to impose compliance requirements to protect citizen’s data as we well…
How Well Countries Are Prepared To Combat Cyberwar?
Earlier we discussed what is GCI and how it is determined. In this article, we will see how the countries are getting benefitted by the GCI. In today’s interconnected world when attack vector is ever increasing and threats are dynamic the quote of Dolly Parton is very well applicable. We cannot direct the wind, but we can adjust the sails…
What is Global Cyber Security Index (GCI) & How To Use It ?
Sabotaging smart grids, health care, and transport and communication systems sitting at the other end of the globe is an attractive target to get countries to their keens without involving military. We have witnessed the dress reharls of these attacks for some time. Recently we have witnessed massive ransomware attacks like Petya /NotPetya and Wanncry hit more than 300 countries,…