Tech mahindra
Tech mahindra

CATEGORY: Security

Why Remote Technical Support is here to stay?

Tech gadgets will thrive in today’s market where every new day marks the birth of a new technology. The recent advancements in connectivity, communication technology and data speed has disrupted the ....

Read More
  • POSTED BY : Ashish Prajapati on May 16, 2016 04:22 PM
  • 1
  • COMMENTS 0

Machine-2-Machine – Security Challenges

M2M refers to communication between machines without any human intervention. It is based on Telemetry which is the technology that allows remote measurement and reporting of information.  Traditional ....

Read More
  • POSTED BY : on September 09, 2014 03:16 PM
  • 1
  • COMMENTS 0

Types of Access Control Mechanisms

Most of us have come across the terms MAC, DAC, RBAC, ACLs while reading various e-security related articles. However, not all of us (except the CISSPsJ) know the meanings of these terms and the ....

Read More
  • POSTED BY : on September 09, 2014 03:11 PM
  • 0
  • COMMENTS 0

DLP: an organization requirement

“Security Is More Than Just Anti-virus: Inbound Protection Isn't Enough” Have you heard about "giant security breach" at an online marketing firm, where the names and email addresses of ....

Read More
  • POSTED BY : Archana Chimankar on August 26, 2014 12:54 PM
  • 0
  • COMMENTS 0

RSA Conference 2013: A Perspective on Security Technologies

RSA Conference 2013: A Perspective on Security Technologies RSA Conference at San Francisco is an annual event where the best of the security product vendors and industry experts convene to share ....

Read More
  • POSTED BY : on March 04, 2013 12:55 PM
  • 0
  • COMMENTS 0

15 Categories that constitute Cybercrime

It is acknowledged that there is no comprehensive definition for Cybercrime. Definitions vary, as cybercrime is a new and rapidly evolving theme. Cybercrimes are crimes that:•  are targeted against a ....

Read More
  • POSTED BY : Lucius Lobo on January 31, 2012 12:25 PM
  • 0
  • COMMENTS 0

2011- An year that put spotlight on Business continuity planning for large enterprises and SMBs

Business Continuity Planning (BCP) involves understanding risks such as natural disasters, facilities and supplier outages to a business, and putting into place a robust mitigation plan for ....

Read More
  • POSTED BY : Lucius Lobo on January 13, 2012 03:45 PM
  • 0
  • COMMENTS 0

A Strategic Approach to Security Risk while CloudSourcing

I was privileged to address a distinguished audience of leading Indian CIOs at the IDC Cloud 2.0 Asia Summit in Mumbai last week to present my thoughts on how companies could adopt a strategic ....

Read More
  • POSTED BY : Lucius Lobo on December 12, 2011 03:25 PM
  • 0
  • COMMENTS 0

Social Media Assessments crucial to measure online risk to company brands

Has your company undergone a social media security assessment which assesses social media employee policies, their implementation and online employee behavior? If not, it’s perhaps time to start as ....

Read More
  • POSTED BY : Lucius Lobo on December 12, 2011 02:55 PM
  • 0
  • COMMENTS 0

What the Hack is going on

One of the greatest myths that I have realized in the current world is that There is Security.We are not talking about kids or novices on some other social networking web site or some site that ....

Read More
  • POSTED BY : Dominic Mascarenhas on September 16, 2011 04:15 PM
  • 0
  • COMMENTS 0

Eight Political Issues around Security and Privacy in Cyberspace

As cyberspace becomes a dominant form of global communications and trade, so does its political use. This is the first part of a multipart blog on the eight key political issues around internet ....

Read More
  • POSTED BY : Lucius Lobo on August 01, 2011 04:35 PM
  • 0
  • COMMENTS 0

Hackers are Easy to Train, Difficult to Motivate? As of today that is!

A 19 year old man has been detained in UK by Scotland apparently in connection with the spate of cybercrimes against US Senate, CITI and the CIA. It is commonly acknowledged that hackers are ....

Read More
  • POSTED BY : Lucius Lobo on August 01, 2011 04:35 PM
  • 0
  • COMMENTS 0

Can Enterprises Crowdsource Security Testing of their Websites?

The rate at which external websites are being hacked demonstrates the lack of an effective defensive mechanism in enterprises. Cyber laws were created to safeguard against script kiddies from hacking ....

Read More
  • POSTED BY : Lucius Lobo on July 26, 2011 04:30 PM
  • 0
  • COMMENTS 0

Telco’s on a cross road – Changing eco-system and security impact

Telco’s on a cross road – Changing eco-system and security impact The time I joined telecom sector, so much have changed but still the pace of change hasn’t slowed down. To my surprise we are ....

Read More
  • POSTED BY : Gaurav Sharma on July 11, 2011 12:55 PM
  • 0
  • COMMENTS 0

Machine-2-Machine – Security Challenges

M2M refers to communication between machines without any human intervention. It is based on Telemetry which is any technology that allows remote measurement and reporting of information. Traditional ....

Read More
  • POSTED BY : Sivaraj Ambat on July 04, 2011 12:25 PM
  • 0
  • COMMENTS 0

Types of Access Control Mechanisms

Types of Access Control Mechanisms Many of us have come across the terms like MAC, DAC, RBAC, ACLs while reading various e-security related articles. However not all of us (except the CISSPs) know ....

Read More
  • POSTED BY : Monica Rana on June 16, 2011 12:40 PM
  • 1
  • COMMENTS 0

Smart ideas, Bright minds and Digital Armageddon

Smart ideas, Bright minds and Digital ArmageddonIt took the utilities almost a century to come up with the idea of “Smart Energy” and as the “bright minds” around the world debate on its impending ....

Read More
  • POSTED BY : Alex Mathews on May 16, 2011 11:40 AM
  • 0
  • COMMENTS 0

IAM - Is Building Consolidated Identity repository a must for an Org - Internal

IAM - Is Building Consolidated Identity repository a must for an Org - InternalI always come across questions from customer about automation of user provisioning / deprovisioning. For provisioning ....

Read More
  • POSTED BY : Nilesh Shirke on May 11, 2011 12:05 PM
  • 0
  • COMMENTS 0

Decoding the Fastest Worm in Internet’s History

Decoding the Fastest Worm in Internet’s HistoryDuring the final stages of World War II a small atom bomb explosion caused huge devastation in the cities of Hiroshima and Nagasaki killing nearly ....

Read More
  • POSTED BY : Kamlesh Patil on May 11, 2011 11:55 AM
  • 0
  • COMMENTS 0

Secure Code Review- Filling the Essential GAP in Software Security

Secure Code Review- Filling the Essential GAP in Software SecurityThe telecommunication industry has faced many changes in the last decade. By the end of 2009, nearly 70 % of the world population had ....

Read More
  • POSTED BY : Shivi Arora on April 11, 2011 11:50 AM
  • 0
  • COMMENTS 0

Security Threats will rise as Application Stores become Popular

In the past six months most of the major carriers in India have rolled out their own application stores. Today, there are over 500,000 applications available to Indian mobile users. India is a fast ....

Read More
  • POSTED BY : Lucius Lobo on January 25, 2011 10:30 AM
  • 0
  • COMMENTS 0

Threats in the Networked world

Organizations today are facing security threats that would have been un-imaginable only a few years ago. It is unfortunate that security continues to be an afterthought, based on the fact that though ....

Read More
  • POSTED BY : Lucius Lobo on September 08, 2009 12:45 AM
  • 0
  • COMMENTS 0

Contact Us

Archives

For further information please write to connect@techmahindra.com

For further information please write to connect@techmahindra.com