Woman hand choosing tablet from a bookshelf.

AFCOM Data Center World – Day 2

My experience on Day 2 of the AFCOM conference has oriented on datacenter operations process and financials.  As a general theme, IT managers are preoccupied with effective execution and managing costs.  A couple of observations: Discussions and presentations on the topic tend...

/ March 31, 2011
Woman hand choosing tablet from a bookshelf.

AFCOM Data Center World – Day 1

Zensar is exhibiting at the AFCOM Data Center show and I wanted to update everyone on what we are seeing. The show and the organization brings together a myriad of datacenter professionals, ranging from private, public (gov’t, education) and not for profits...

/ March 30, 2011
enter password on the smart phone

RSA SecurID Breach: Are Your Tokens Safe?

The news of a security breach at one of the world’s trusted security firms has raised concerns among companies across the globe. While RSA is not releasing the details around the breach at this time, which they have categorized as an “advanced...

/ March 21, 2011
Group of Multi Ethnic Corporate People Having a Meeting

You can outsource the work, but not the responsibility

Many organizations are under the impression that if they outsource their credit card transactions, then they are not responsible for their PCI compliance. While this may minimize the scope of the PCI environment, it does not alleviate the responsibility for their PCI...

/ February 21, 2011
P3 Cubed - Focus on the Basics Part III

P3 Cubed: Focus on the Basics Part III

From my previous discussions on the three P’s – Passwords, Patching and Ports, let’s talk finally about Ports. The Third P – Ports: Open TCP and UDP ports, especially open ports that are not required for business purposes, continue to be something...

/ January 21, 2011
P3 Cubed - Focus on the Basics Part II

P3 Cubed: Focus on the Basics Part II

Continuing from the previous discussion on the most significant areas of technical concern in the area of information security and assurance and the three P’s – Passwords, Patching and Ports, let’s talk next about Patching. 

/ January 21, 2011
P3 Cubed - Focus on the Basics

P3 Cubed: Focus on the Basics

One of the most significant areas of technical concern in the area of information security and assurance is what we have come to call the three P’s – Passwords, Patching and Ports.? Default and weak passwords continue to impact organizations, especially on...

/ January 1, 2011
Climbing to success concept on a mountain and reaching the peak and summit as a businessman with arms in the air standing on top of two cliff sides shaped as an arrow symbol.

As the year and the decade changes

It's been a decade that started with fear, uncertainty and doubt and seems to be ending that way again for the Indian IT and Business Services Sector. But the industry proved the pessimists wrong then by moving up the value chain and...

/ December 31, 2009
Modern computer media devices concept: desktop monitor, office laptop, tablet PC and black glossy touchscreen smartphones with internet web business news on screen and stack of color newspapers isolated on white background

The Satyam saga ends

Friends, The curtains have come down on what has probably been the most exciting act ever played out by the IT industry on the stage of the Indian corporate sector. It all started for me personally when an irate investor from the...

/ April 14, 2009
Perspectives for Indian IT

Perspectives for Indian IT

Perspective 2020 – the NASSCOM-Mckinsey study The preview of the report presented today at the NASSCOM Leadership forum by the Mckinsey team has clearly spelled out the numerous benefits that the growth of the industry in the last ten years has delivered...

/ February 11, 2009