Information Security


Information Security: How critical is it?

As per the current trends, the news of some or the other organization falling victim of foul cyberattack led breach, resulting in exposure of sensitive information and confidential data is no more a rare scenario. When servers were securely encrypted and hidden away behind the corporate firewalls and perimeter-deployed intrusion prevention controls, enterprises took the security aspect complacently and completely relied on their host information security system. However, unforeseen events and actions have exposed the inadequately architected information security controls. Network-based protection has made the businesses information quite vulnerable to attacks while......

Continue Reading


Imagine a world where every aspect of your life is connected. What you do is recorded by a growing number of connected devices you touch, interact and encounter every day. And then the collected data is shared over a network. Our world is becoming a central nervous system running on a network of connected devices. By 2020, the number of internet-connected devices will reach 50 billion. Mathematically, that’s around 8 connected devices per person. And this indeed creates a simple but a dangerous dilemma. While our ability to collect data will grow......

Continue Reading


Enterprises encounter serious security breaches despite investing heavily in Information security infrastructure. Hackers are always devising new ways to breach the Information security of an organization, either from within the company or from outside. Research suggests that 90% of enterprise breaches could be prevented through proper monitoring. However, setting up a 24X7 Security Operations Centre (SOC) to monitor is an enormous challenge because: The high set-up costs can run into lakhs and crores of rupees Demands significant time and effort Growing shortage of skilled in-house security experts THE CMS IT PROPOSITION CMS IT is......

Continue Reading


Security breaches have turned to be regular news headlines. And these breaches occur everywhere, from small to big company, and in every industry, from retail to IT. The threat posed by cyber criminals to critical IT infrastructure and business interest is a dangerous reality of today. It is further worsened by the fact that many businesses operate in different geographical locations. The applications and systems are accessed from multiple devices making businesses more susceptible to cyber threat than ever before. This has made cyber security a critical board room priority now. The......

Continue Reading


Release Date: 23/11/2015 | SEVERITY: Critical | After the Superfish malware that attacked Lenovo laptops this february, another big computer manufacturer Dell’s PCs and laptops are reportedly found to have been pre-installed with a rogue SSL certificate that could allow attacks. It lets an attacker easily impersonate as a HTTPS-protected website and spy on when banking or shopping online. The rogue certificate, dubbed eDellRoot, was first discovered over the weekend. The certificate automatically re-installs itself even when removed from the Windows operating system....

Continue Reading


Assimilation of Security Technologies into Cloud Platforms

Cloud is the future and organizations around the world are adopting cloud platforms for managing their IT resources. According to a recent Gartner report on the cloud computing trends in India, the enterprise IT spend on cloud computing increased to $71 Billion in 2016, a six percent increment from 2015i. The trend is slated to continue. The same Gartner report positioned cloud computing to constitute a major share of the IT investments this year. With an increased rate of adoption and especially post recent cyber-threats like WannaCry and Petya, organizations across the......

Continue Reading