Meet IRA – Smart Security solution that not only reports but helps Prevent!

IRA is a revolutionary smart security solution that uses behavioural audio and video analytics based security solution which not only watches over the user, but has the wisdom to discern & learn and has unique personal safety features. It detects intrusion and violence using situation interpretation algorithms that fuse behavioral audio and video analytics and deters… Continue reading Meet IRA – Smart Security solution that not only reports but helps Prevent!

IoT Security Challenges and how can we address them?

From music speakers to thermostats, to lights and accessories, everything has some sort of intelligence; We are living in tech heaven, to be precise. Having moved from keypads to touch interfaces, we are currently in the no interface era. Every company is focusing on getting the maximum done with very little interaction with the device,… Continue reading IoT Security Challenges and how can we address them?

Technologies That Help Improve Security Management

source: https://pixabay.com/en/cyber-security-online-computer-2296269/

The more data gets put online and the more activities that happen on the Internet – the bigger security risks we face. This does not only apply for sensitive business information but also personal details like address, bank details etc. If you are looking for ways to improve your security management, this is the right… Continue reading Technologies That Help Improve Security Management

Device Level Security in the scheme of Internet of Things (IoT)

Anyone who is by any stretch a stakeholder in the IoT scene will tell you that there are two major issues, one is overall security that we discussed in my previous article and then there is the device angle to security. After all, if the device isn’t ready to scale, even the most thought out security schemes will fali miserably. So it is very relevant and important that we touch upon this angle in our second discussion about the IoT that is just around the corner. Let us discuss device level issues now.

Google Introduces USB Security Key for 2-Step Verification

Few days back we were discussing on how to keep your Passwords and Online Accounts Safe; one of the tips was to use the Two Factor Authentication. Google today introduced the two step verification with Security Key. One can now choose Security Key as the primary method, instead of having verification codes sent to the phone. With Security Key, one does… Continue reading Google Introduces USB Security Key for 2-Step Verification

Command Line Vulnerability – ‘Shell Shock’

On September 24th, a critical flaw was announced in the GNU Bourne Again Shell—better known as Bash. Companies are scanning and applying the first set of patches provided to address CVE-2014-6271. Because the first patch may spawn a new vulnerability, researchers are working on another, related patch for CVE-2014-7169.

Published
Categorized as News Tagged

How to keep your Passwords and Online Accounts Safe?

Internet has provided us with some amazing ways to do our day-to-day tasks better; sharing content and even getting in touch with friends have never been so awesome. As easy as it sounds, it is equally vulnerable to attacks. Most hackers either take control of your account for malicious activity or are just mere stalkers. I did hear about a… Continue reading How to keep your Passwords and Online Accounts Safe?

Download Best Practices Analyzers – Forefront, ISA and Security

Best Practice Analyzers are free tools available for most Microsoft Enterprise products and they are used to determine the overall health of your platform. Here are some tools for Internet Security and Acceleration Server, Forefront Unified Access Gateway, Threat Management, Baseline security and Security update Inventory tool.