Tag: Information Security

The “Breaking Bots” Issue – Zensar ValuePlusTM framework explains how to overcome it
A recent survey by both, Forrester and Gartner shows that “Breaking bots” has emerged as the #1 enemy to Robotic Process Automation (RPA) success. With easy access to UI-based automation, line of business (LOB) owners create RPA bots to automate processes without...

Connected Intelligence Deep Dive: 7 Use Cases for the Insurance Industry
In our recent blog we talked about how Connected Intelligence enables companies to connect disparate technological dots in the modern-day digital landscape. Hence, this paves the way for multiple emerging technologies to function in tandem and collectively work towards achieving common organizational...

How can CIOs Harness the Power of Digital in their Organization?
Digital Transformation is no longer optional in the corporate world. With the global technological revolution gearing exceptional pace, countless job roles are witnessing dramatic overhauls, primarily that of the CIO. In fact, CIOs are even being considered as one of the most...

SeCaaS – A Step Towards a Secure Cloud
Cloud provides its customers with many characteristics such as on-demand scalability, payment as per usage of the resources, accessibility to the data and application from anywhere in the world. With all these features provided by the cloud, security remains the major issue...

Blockchain Transaction Authentication and Security
In the blockchain world, data distribution to all trust less entities and immutability are the major advantages in terms of building transparency in transactions. Then what about the transactions happening between entities who want to maintain secrecy or need authentication so that...

Eyes on Glass: End to End Monitoring
Organizations’ IT Infrastructure will function best when a continuous set of “eyes” are closely analyzing its health and availability; and proactively identifying the issues that keep the business up and running. What plays a pivotal role in defining an overall IT monitoring...

An Eye Opening Threat Assessment
You’ll be amazed at what gets uncovered by a security threat assessment and the valuable insight that results. “Wow, we had no idea that was going on in our network!” After performing numerous threat assessments for a variety of organizations, this is...

E-ZPass Spear Phishing Email Alert
Please be aware of a Spear Phishing email that targets E-ZPass users. The subject line reads “FW: Pay for driving on toll road” and the body of the email looks like this: You have not paid for driving on a toll road....

The Softer Side of Information Security…
I recently went to a presentation at Norwich University in Vermont. Tom Peters was the speaker. For those of you that don’t know or recall Tom Peters, he is the guy that wrote a book back in 1982 called “In Search of...

P3 Cubed: Focus on the Basics Part III
From my previous discussions on the three P’s – Passwords, Patching and Ports, let’s talk finally about Ports. The Third P – Ports: Open TCP and UDP ports, especially open ports that are not required for business purposes, continue to be something...