Quality Assurance and Project Management:

Security

1

May 6, 2018  5:27 PM

18 Information Security Pain Points For An Organization

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Information security

I am listing 18 Information Security Pain Points that cause quite embarrassing situations in an enterprise. Each of these may cause minor to major losses to an organization. These losses may be in terms of finance, reputation, or business. In fact, all three have a deep connection. These lapses in...

April 29, 2018  11:38 PM

Is Internet Explorer The Most Vulnerable Browser Now?

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Data Leakage, eavesdrop, Internet Explorer, Microsoft Edge, Phishing, Ransomware, vulnerability

Has Internet Explorer become the most vulnerable browser? Has Microsoft lost control over it? Or Is it that Microsoft is having no more focus on it? Whatever is the case, it is not as secure to use IE. At least in your enterprise environment. In fact, it is now a legacy browser having not much...


April 29, 2018  11:26 AM

How To Handle Secure Shell (SSH) Vulnerabilities?

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Data Encryption, IT security, Secure Shell, SSH

Is Secure Shell or what we call it as SSH completely secure? It is almost more than two decades when Tatu Ylonen from Finland realized a strong need for security components in the online transactions. Realizing that, he created SSH, a powerful protocol to access anything on the internet. What it...


March 25, 2018  7:06 PM

Is Cloud Lessening Data Breaches Burden On Enterprises?

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
cloud, Cloud adoption, Information security, security breach

There are few things to notice about data breaches. Enterprises are preferring cloud over on-premise for less critical applications. That means information security trends are changing noticeably. But more important is to understand is Cloud driving shift in security spending. In fact, is that...


February 27, 2018  7:13 PM

Unpatched Applications Are Like An Open Invitation For Security Breach

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
patch, Patch management, patching, security breach

I think no learning has come to enterprise from the famous 2017 Equifax security breach. The reason was an easy penetration through an unpatched application. 70% of enterprise worldwide are still living with this vulnerability. Merely banking on IT staff will never resolve this issue. There has to...


January 12, 2018  9:46 PM

Timely Communication Plays An Important Role In Business

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Communication, Incident response

Recently I visited a restaurant in one of the posh colonies in South Delhi. It is one of the best restaurants in the capital city as far as its food quality, taste, preparation, and presentation are concerned. We were a group of 10 friends. Everything was going well except three small incidents...


December 15, 2017  8:29 PM

Five Business Elements That Will Decide The Success in 2018

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Business Continuity, Data-security

There are many business elements that decide the fate of a business. With the changing dynamics of business on a global front, it is important to understand what are the top business elements if set right will ensure a success in business. As a matter of fact, how do you measure the success of your...


November 16, 2017  9:23 AM

Security Is The Fourth Pillar Of Product Or Application Functionality

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Application security

If you are in product development, you would be well aware that in addition to stability, scalability, and usability, security is the fourth pillar of functionality. These four components, in fact, have become an integral part of the basic functionality of any product, project, or service. Security...


October 21, 2017  10:00 PM

Data Privacy Is Of Utmost Importance In Healthcare Organizations

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
cybersecurity, Data privacy

Data Privacy is of utmost importance in healthcare organizations. Especially, the data that pertains to patients requires complete safety and protection. This data, if leaks to unreliable sources can lead to a big amount of blunders that might become difficult to handle and control. That is why...


October 21, 2017  9:23 PM

Why DMARC Is Important To Deploy To Check Spoofing and Phishing

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Hacking, Phishing

DHS (Department of Homeland Security) has come out with a new regulation about an email security program. It is now compulsory for the US federals to deploy DMARC ( 0 Comments     RSS Feed     Email a friend


September 30, 2017  2:49 PM

Security Testing Steps For Testing Team Of An Organization

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Application security, code security

Security Testing is not a new phenomenon but its depth is compellingly increasing due to avoid 0 Comments     RSS Feed     Email a friend


September 30, 2017  12:08 PM

Security Flaws – Top 3 Code Vulnerabilities Causing Security Gaps

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Application security, code security

Increasing presence on internet demands higher level of security. Same way, enterprises are moving to cloud for residing their valuable data and applications. All this attracts potential risks, especially in terms of virus, ransomware, and malware. In fact, hackers only need a small wsecurity flaw...


September 30, 2017  8:26 AM

Security Testing for Web Applications Is A No Compromise Affair

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Application security, Cloud Security, code security

Increasing presence on the web is also exposing our applications and data to higher risk. These risks include cyber attacks that are now increasingly creating panic for enterprises. That is why security testing for all kind of web applications are very important. In fact, important to an extent...


August 29, 2017  10:25 PM

Security Positive Culture Is Important To Create In An Enterprise

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Data security breaches

Data security is the biggest concern for any business or enterprise. Without considering the size of a business, it is of utmost importance. But how many businesses understand this? In fact,...


August 29, 2017  10:02 PM

Data Security Is The Least Concern And Biggest Threat For Startups

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Data security breaches, Startup

Imagine a startup scaling up with the substantial gain of users in their online community. Of course, the business has a business app in place. On daily basis, there is an increase in their user base. New users are registering on a regular basis without considering the presence or absence of data...


July 31, 2017  12:11 PM

Security Assessment – How Critical Is It For IT Governance

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Cyber insurance, Cyber security, Fortinet, IT Governance, Risk management, Security assessment

Something important happening in terms of Security Assessment Program is worth pondering. Australian Insurtech enterprise Cyber Indemnity Solutions (CIS) collaborates with Fortinet on a critical program that will keep analyzing weaknesses in security framework in organizations. Fortinet, as we...


July 17, 2017  10:01 AM

Instant On Security Is Very Essential for Always-On Enterprise

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Enterprise Security, malware, Ransomware, TrendMicro

Instant On Security for Always-On Enterprise by Ankur Patial, Technical Consultant (Cyber Security), TrendMicro was an interesting topic during this year VeeamOn Tour. There is a rapid growth of cloud computing. But the shocking report...


May 31, 2017  4:42 PM

IIoT Chip with Cryptographic RoT and Machine Learning by WISeKey

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Cryptography, Cyber security, IIoT, Machine learning

New IIoT (Industrial Internet of Things) chip with embedded cryptographic RoT (Root of Trust) is launched by WISeKey. This chip has machine learning capabilities thus making it smart and fit for intelligent activities. The new chip will become...


May 31, 2017  10:00 AM

Conflict Between Changing Roles, JDs, and Accountabilities

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
CCNP, Change management, CIO, CISO, COBIT, IEC 27001, ISO

CISOs or CIOs roles are changing very dynamically. In fact, sometimes organizations have unreasonable expectations from these roles. Especially when you are working with global clients, the perspective change happens altogether. An organization must be very clear in defining JD of all key IT roles...


May 31, 2017  9:49 AM

Cyber Attacks and ISACA, COBIT 5, CMMI, 33XXX Certifications

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
CMMI, COBIT, Cyber security, cyber-attacks, ISACA

In India for every cyber attack, you need to report it to CERT-IN. An interesting point to understand is how many companies follow Cobit 5? Quite a few are having their own processes and frameworks. In fact, how many organizations crave for process maturity? How do they manage their processes in...


March 31, 2017  12:36 PM

Cloud Migration: Security Concerns Regarding Cloud Industry

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Business Continuity, cloud, Cloud migration, cybersecurity, Disaster Recovery

There are ample benefits when you migrate to the cloud. Imagine a huge data center consuming a lot of power and engaging a lot of manpower. On the other hand, a one-time cloud migration would take away all these hassles away from you. But before you plan to migrate to the cloud, there are a lot of...


March 20, 2017  9:37 PM

Information Security Framework – What To Consider?

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Information security, Security Framework

Information security frameworks questions are quite common across the globe. Technology and business keep raising concerns about the information security. The information security...


February 27, 2017  3:03 PM

Rising Security Concerns With Rise In IoT Projects

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Internet of Things, iot, Security

Internet of Things is not merely a buzzword. In fact, a lot is happening in this area worldwide. But at the same time, there is another issue. The rising security concerns with the rise in IoT projects is creating a different set of threats for industry. As a matter of fact, there are many...


January 31, 2017  10:32 PM

Intellicta Platform – How It Works To Improve Overall Cyber Risk Posture

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Cyber security, IT security

It will be interesting to understand the functioning of Intellicta Platform. This is a new platform from TechDemocracy. Before that you may like to read the 0 Comments     RSS Feed     Email a friend


January 31, 2017  9:42 PM

Intellicta Integrates Leading Enterprise-Class IT Security Technologies

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Compliance, Cyber security, Cyberattack, Governance, IT security, risk, Security

TechDemocracy launches Intellicta that is the first ever platform offering businesses a new paradigm in the assessment of Compliance, Security, Risk, and Governance Tools. In fact, it is first ever tool that provides this four-dimensional...


April 25, 2016  9:13 AM

Cloud Outage Incident Response COIR Unveiled by Singapore

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Business Continuity, Cloud Disaster Recovery, Cloud outages, Disaster recovery and business continuity, Disaster recovery planning, Incident response

Singapore launches new Cloud Outage Incident Response Guidelines. Cloud Outage Incident Reponse is also termed as COIR. COIR (Cloud Outage Incident Response) guidelines help in BCM and DR Plans. Singapore recently launched new Cloud Outage...


February 28, 2016  10:31 AM

Application Security – Three Levels of Security Testing

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Application security, Security testing

Application Security is a major concern inviting a series of multichannel risks. Application security is a major concern that needs to be addressed in a systematic and disciplined manner. There has to be a defined process to do so. It can never be done on an ad-hoc basis. With...


January 31, 2016  9:46 PM

New Federal Security Clearance Program – Role of IT and Leadership

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
cybersecurity, IT leadership, IT systems, IT systems management, Leadership

Success of new Federal security clearance Program depend on Role of IT and leadership. New Federal Security Clearance Program implementation success lies on right IT systems. Administration begins implementation of its New Federal Security Clearance...


November 8, 2015  11:23 AM

Koenig: A Top International IT Training Indian Company

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Adobe, Apple, Checkpoint, Cisco, Citrix, CompTIA certifications, Corporate culture, EMC, Hadoop, IT training, Microsoft, Microsoft Dynamics, Novell, Oracle, PRINCE2 certification, RedHat, Salesforce.com, SAS, Scrum, VMware certifications, Zend

Koenig Solutions Ltd. is an entirely different world in its own. It's a world of freedom, happiness, results, trust, self-competition and dedication. Serving to a...


October 31, 2015  1:53 PM

Are You Ready For Data Protection Regulation Compliance?

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Compliance, Compliance Assessment, Data protection, Data regulations, Information security, Information security governance, Regulations, Risk management

IT Governance Ltd. is engaged in providing books, training, consultancy and tools for IT Governance, information security, risk management and compliance. The is one of the known single-source with a provision of providing such a wide...


June 28, 2015  1:10 AM

When A Team Member Fails To Honour Timeline

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Monitoring, Project management, Project Manager

Project Scope, project timelines and monitoring are the prime tasks of a project manager. If a team member fails to honor his or her individual tasks timelines, it is not the failure of that individual team member. It clearly indicates a lack on a monitoring process. The monitoring process has to...


November 2, 2014  5:24 PM

Worlds First Data Science Platform Launched By BigPanda

Jaideep Khanduja Jaideep Khanduja Profile: Jaideep Khanduja
Data Science, Incident management, Incident response

BigPanda


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: