<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=754813615259820&amp;ev=PageView&amp;noscript=1">

Cybersecurity Blog

In the current business scenario, virtually every ERP application is vulnerable to unauthorised access, financial fraud, sabotage or espionage (leakage of industry secrets) from...
6 May 2016
In 2015, ISC2 (the official CISSP certification body) revised the CISSP official book from an earlier Third Edition to a new FOURTH Edition book with some changes.
14 April 2016
There are many articles already published on the Internet on this topic. As this is of interest to you, I will quickly share a few success mantras that I followed to help me pass...
14 April 2016
The term risk assessment is not risk management. We have seen clients using these terms as synonyms as part of daily office interactions. So, what is the key difference? A risk...
7 April 2016