|File Size||5.37 MB|
|Create Date||September 19, 2014|
|Last Updated||September 19, 2014|
Cyber Security Outbreaks – An Insight by Nilaykumar Sangani
Large Organizations/ Small and Medium enterprises / Universitities enrich a huge part of the country’s economy. As the world advances towards the cyber world era, information security threats keep on increasing in the form of malware, viruses, internet attacks etc. Aim of this article is to identify and provide an understanding of the major cyber security threats along with their counter measures.
Arming the Brain by Michael Christensen
The users are often the last line of defense, when the technical controls do not stop threats. Security Awareness training is sometimes undervalued, but at the end of the day, the individual user can make a substantial difference, knowing what to do or not to do!
Social Engineering and How It Helped Us Find A Mole by Kishor Sonawane and Akshay Dixit
Social Engineering is essentially the art of influencing some person into doing things that he may or may not do willingly. It is not a concept that got into picture recently, but has probably been existent since hundreds of years. Simply put, every time you try to get someone to do something that is in your interest, you are applying social engineering.
Middle East Hacking by Dan Emory
A hacking war is raging in the Middle East against the backdrop of significant conventional conflict and tumult in the region. This article identifies and discusses the main players, their targets, the methods of attack, and how organizations can protect themselves from becoming a target.
Cloud Infrastucture Security by Massimo Ferrari
Cloud Computing is becoming a standard “de facto” for an every-day-larger Enterprise public. Despite its constant evolution many corporate workloads and applications are already “in the cloud” but this technology goes with so many names that most of the people don’t realize that their day by day activity is cloud based.
PCI DSS 3.0 Changes by Sandeep Singh
PCI DSS 3.0, the new and the latest version of the Payment Card Industry standard is to include changes which will focus on more education and awareness, increased flexibility and security as a shared responsibility. This article will brief its readers on the proposed changes to be introduced in the PCI-DSS 3.0 to be officially introduced in November this year.
ICS Security Posture by Sinclair Koelemij
The author has conducted cyber security assessments for the process control industry for over 12 years now, primarily in the EMEA region. Much has changed since these early days, cyber security has grown from infancy into adolescence but still has a long way to go to reach the maturity level necessary for protecting these critical systems. This article describes where we are today and how the industry has evolved toward adolescence.
Defending Industrial Control Systems with Data Diodes by Austin Scott
Originally designed by government organizations to protect top secret information, data diodes are most commonly used in applications requiring the highest level of security such as state secret protection, banking or battlefield up-links. In recent years we could observe an increasing demand for data diodes in the world of industrial control and automation to protect critical infrastructure due to the simple and virtually impenetrable nature of these devices. In this article the author explores the inner workings and practical control system applications of these unidirectional gateways and provide a step by step guide to creating your own using open source software.
Digital Currency – Future of Bitcoin by Prabh Nair
Its very important to understand the future of Digital Currency that is bitcoin. What is Bitcoint. Bitcoin is Networked Crypto-Currency. Networked Crypto-Currency Crypt ” refer to the fact that the technology is based on the “Cryptography” branch of Mathematics.