Though we have seen that in last 40 years or so Internet has brought us email, world wide web, dot-com, social media, the mobile web, cloud computing, and the early age of Internet of things. However there is a serious business challenge which we have not been able to resolve quite effectively is the identity … More Trust protocol and Block chain
Many large organisations have been trying to introduce new way of doing things to be aligned to changing world or which many call the Fourth industrial revolution. Most of these companies want to be prepared and not late in the race, which unfortunately has already begun few years ago. Technology companies are replacing the the … More Lets implement new ways of doing stuff.
We are overwhelmed by media blaring news of cyber security events and in this noise, we tend to form an opinion that may be Cyber security risk is the most impact risk event for businesses to manage. However, it’s interesting to note that traditional fraud embezzlement (internal fraud) events are still happening with significant consequences. … More ABB Korean Fraud
Risk intelligence is our ability to measure the limits of our own knowledge- to be cautious when you don’t know much, and to be confident when, by contrast, you know a lot. People with risk intelligence tend to be on the button in doing things. RI concept is important to important as we are so … More Why risk intelligence?
Cool presentation to explain the basic principle behind internet connectivity. Helps one to understand the difference between Client and Servers. Explains how the information travels across the wire in form of packets and how these are re-assembled. What is the importance of IP addresses and how router act as a gateway to each new highway … More How does internet work?
Amit Yoran President RSA – is a rock star presenter on security topics. This is the second time I attended his presentation and as always his passion and motivation is infectious. Amit leaves his audience confident, assuring and motivated that they have not made mistake to pursue in field of Information security. Some of the … More Amit Yoran – RSA Singapore 2016
Blockchain is a cryptographically secure, distributed database consisting of linked, time-stamped blocks of data such as transactions. It is based on decentralized, peer to peer consensus and an incentive-driven model of security. Each bock in a blockchain contains a cryptographic hash of the previous block, which secures the integrity of the transaction data. The hash … More Blockchain