Monday, September 22, 2014

Internet of Things - The changing INFORMATION landscape

Author - Kaushik Pandey

“Is it possible that a baby monitor can be used for spying?”
“Is our smart interactive TV keeping track of our viewing habits?”
“While we are driving to the office, is it possible that the car gets hacked?”

These questions may be new for us but the concept is an old one but let’s just accept the fact that who bothers about these things. Let them go…!!!

Wednesday, August 20, 2014

Risk Assessment – Challenges and Opportunities

Author - Abhishek Kushwaha

In last few years the industry compliance and regulations have grown more stringent and have been streamlined or are in the process of being streamlined to meet the new technological advancements. Organizations, irrespective of in which sector, public or private, have come to rely heavily on Information Technology and Information Systems for their daily activities. A typical information System in an organization can range from simpler personnel system to complex industrial systems like SCADA. Based on this complexity, the risk associated with the particular system varies from low impact to high impact. Therefore, with the evolving technologies, the standards and regulations have to undergo iterations to remain relevant in the digital age.

Friday, August 1, 2014

Why to integrate PCI with HIPAA

Author - Himanshu Shewale

"Compliance" is a big word for IT industry which is driving a significant amount of business. While following different rules, regulations and standards, you are not just avoiding potential fines and penalties but you are also gaining huge customer trust by ensuring their data is safe and secure in your custody.

Friday, July 18, 2014

Risk Analysis, Success Factor for HIPAA Compliance

Author: Swati Sharma

“Among the areas likely to be a focus of OCR examinations in 2014 is whether organizations have conducted a timely and thorough HIPAA security Risk Assessment, because that was a common weak spot found across the board in the pilot audit program as well as in previous breach investigations”
-Susan McAndrew, OCR deputy director for health information privacy

Friday, March 7, 2014

How to Combat Card Data Breaches?

Author: Nitin Bhatnagar

Understand and Implement Effective PCI Data Security Standard requirements with choosing a good standing Qualified Security Assessor (QSA) recognized by PCI-SSC Council.

Thursday, February 13, 2014

How Not to be Failed in PCI DSS!

Author: Swati Sharma

“Payment Card Industry Data Security Standard is seen as a burden by half of security pros, and 59% don’t think it helps them become more secure, according to a study from Ponemon.”

Wednesday, January 15, 2014

Have Indian Companies Got It Right On Payment Card Security?

Author: Dharshan Shanthamurthy

I have been seeing a number of articles and television channels flashing news about how credit cards have been misused in many places.