Tag: Information Security

SeCaaS – A Step Towards a Secure Cloud
Cloud provides its customers with many characteristics such as on-demand scalability, payment as per usage of the resources, accessibility to the data and application from anywhere in the world. With all these features provided by the cloud, security remains the major issue...

Blockchain Transaction Authentication and Security
In the blockchain world, data distribution to all trust less entities and immutability are the major advantages in terms of building transparency in transactions. Then what about the transactions happening between entities who want to maintain secrecy or need authentication so that...

Eyes on Glass: End to End Monitoring
Organizations’ IT Infrastructure will function best when a continuous set of “eyes” are closely analyzing its health and availability; and proactively identifying the issues that keep the business up and running. What plays a pivotal role in defining an overall IT monitoring...

An Eye Opening Threat Assessment
You’ll be amazed at what gets uncovered by a security threat assessment and the valuable insight that results. “Wow, we had no idea that was going on in our network!” After performing numerous threat assessments for a variety of organizations, this is...

E-ZPass Spear Phishing Email Alert
Please be aware of a Spear Phishing email that targets E-ZPass users. The subject line reads “FW: Pay for driving on toll road” and the body of the email looks like this: You have not paid for driving on a toll road....

The Softer Side of Information Security…
I recently went to a presentation at Norwich University in Vermont. Tom Peters was the speaker. For those of you that don’t know or recall Tom Peters, he is the guy that wrote a book back in 1982 called “In Search of...

P3 Cubed: Focus on the Basics Part III
From my previous discussions on the three P’s – Passwords, Patching and Ports, let’s talk finally about Ports. The Third P – Ports: Open TCP and UDP ports, especially open ports that are not required for business purposes, continue to be something...

P3 Cubed: Focus on the Basics Part II
Continuing from the previous discussion on the most significant areas of technical concern in the area of information security and assurance and the three P’s – Passwords, Patching and Ports, let’s talk next about Patching.

P3 Cubed: Focus on the Basics
One of the most significant areas of technical concern in the area of information security and assurance is what we have come to call the three P’s – Passwords, Patching and Ports.? Default and weak passwords continue to impact organizations, especially on...