Tag: Information Security

The “Breaking Bots” Issue – Zensar ValuePlusTM framework explains how to overcome it

The “Breaking Bots” Issue – Zensar ValuePlusTM framework explains how to overcome it

A recent survey by both, Forrester and Gartner shows that “Breaking bots” has emerged as the #1 enemy to Robotic Process Automation (RPA) success. With easy access to UI-based automation, line of business (LOB) owners create RPA bots to automate processes without...

Connected-Intelligence-Zensar

Connected Intelligence Deep Dive: 7 Use Cases for the Insurance Industry

In our recent blog we talked about how Connected Intelligence enables companies to connect disparate technological dots in the modern-day digital landscape. Hence, this paves the way for multiple emerging technologies to function in tandem and collectively work towards achieving common organizational...

How-can-the-CIO's-organization-harness-the-power-of-Digital

How can CIOs Harness the Power of Digital in their Organization?

Digital Transformation is no longer optional in the corporate world. With the global technological revolution gearing exceptional pace, countless job roles are witnessing dramatic overhauls, primarily that of the CIO. In fact, CIOs are even being considered as one of the most...

/ April 1, 2019
SeCaaS Secure Cloud

SeCaaS – A Step Towards a Secure Cloud

Cloud provides its customers with many characteristics such as on-demand scalability, payment as per usage of the resources, accessibility to the data and application from anywhere in the world. With all these features provided by the cloud, security remains the major issue...

/ October 29, 2017

Blockchain Transaction Authentication and Security

In the blockchain world, data distribution to all trust less entities and immutability are the major advantages in terms of building transparency in transactions. Then what about the transactions happening between entities who want to maintain secrecy or need authentication so that...

/ October 4, 2017

Eyes on Glass: End to End Monitoring

Organizations’ IT Infrastructure will function best when a continuous set of “eyes” are closely analyzing its health and availability; and proactively identifying the issues that keep the business up and running. What plays a pivotal role in defining an overall IT monitoring...

/ December 10, 2015

An Eye Opening Threat Assessment

You’ll be amazed at what gets uncovered by a security threat assessment and the valuable insight that results. “Wow, we had no idea that was going on in our network!” After performing numerous threat assessments for a variety of organizations, this is...

/ April 23, 2015

E-ZPass Spear Phishing Email Alert

Please be aware of a Spear Phishing email that targets E-ZPass users. The subject line reads “FW: Pay for driving on toll road” and the body of the email looks like this: You have not paid for driving on a toll road....

/ July 28, 2014

The Softer Side of Information Security…

I recently went to a presentation at Norwich University in Vermont. Tom Peters was the speaker. For those of you that don’t know or recall Tom Peters, he is the guy that wrote a book back in 1982 called “In Search of...

/ June 30, 2011

P3 Cubed: Focus on the Basics Part III

From my previous discussions on the three P’s – Passwords, Patching and Ports, let’s talk finally about Ports. The Third P – Ports: Open TCP and UDP ports, especially open ports that are not required for business purposes, continue to be something...

/ January 21, 2011
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...