As an important emerging Tech Trend for 2016, new age cloud-enabled technologies will continue to push the envelope, while traditional solutions may keep their footing in the fast converting market place. Internet-of-things (IoT) devices, mobile apps and complex networks will keep the tech security space evolving – with SSO expanding … Read More

By their very nature, IT network of educational/ academic institutions are used by a large number of transient users. One of the examples of a transient user is an aspiring student who fills up an application and use parent’s credit card to make the payment. Such details are stored in … Read More

As the need & acceptance for 24×7 connectivity grows in both personal & professional lives of the burgeoning corporate professionals all over the globe – a large number of organizations are now in need of enterprise-wide mobility. Such a business model requires intelligent application stores with a strong suite of … Read More

A Chief Information Security Officer (CISO) is someone who has climbed up to a senior-level executive role within an organization. The key responsibility is to establish, protect and maintain enterprise vision, strategy and program to ensure information assets are protected through right set of technological interventions. With time, the role … Read More

The demand of business today is to allow data on the go and Internet of Everything is catching up fast – these are areas of concern for the keepers of cyber security. Usage of mobile devices has been higher, tablets are only extending the purview of hand held devices. Many … Read More

As cyber thefts focus more on is looking at cracking through super users and regulatory requirements revolve around big data, ignoring either big data or super users can prove disastrous.
Finding creative, innovative ways of breaking into data treasures, and hacking is today’s reality. Privileged account management has been critical … Read More

Businesses that are able to implement Identity and Access Management (IAM) technology in the right way are promised big rewards. However, CIOs and decision makers need to gain perspective on IAM implementation and make sure that their approach is progressive to get the best out of their IAM investment.
A … Read More

Despite being pegged as intuitive and intelligent system, Identity and Access Management (IAM) implementation remains a struggle for many. IAM assist in creation of secure IT System with an improved ability to automatically detect threats and cyber risks. Organizations are able to achieve maximum information security. Improved security and surveillance … Read More

Healthcare, being a social sector is designed for public access and traditionally has not considered enforcing safeguards. An effective way to approach HIPAA compliance in a healthcare establishment is by ensuring that any myth related to the regulation is defied. It becomes crucial to gain deep knowledge about the regulations. … Read More

Did you receive a request for approval lately? Is that request lying on your inbox unattended? Is there any further clarification (or worse – a series of clarifications) required to process that request – perhaps a policy consideration which might require intervention of a super senior resource? What if you … Read More

When I think of government enacted legislation, I remember the famous quote from one of the influential humanist philosophers, Marsilio Ficino, “Everything in nature is either a cause aimed at you or the consequence made by you”. With the history behind us on the Enron accounting scandal and the future … Read More

IT security best practice keeps evolving, regardless of whether businesses claim that they are well aware of them. Furthermore, this knowledge is of little benefit if pre-empted actions to prevent mishaps are not taken. With IT infrastructures within companies becoming increasingly complex, it is becoming all the more important for … Read More