Information Security Facet of Data Protection Act UK

Blog The Data Protection Act of UK is known to be one of the most stringent regulations when it comes to protecting “Personal Data”. The Act regulates how personal data needs to be protected while it is processed, stored or transmitted by the data controller. A data controller can be any entity that holds information about its… Continue reading Information Security Facet of Data Protection Act UK

Published
Categorized as Blogs

Evolving trends in Payment Card industry

Blog With the budding trend of e-commerce industries, we are seeing an all-time high in transactions happening via Card-Not-Present channel. As the organizations allow features like express check-out, they end up storing cardholders data. Hence, the need to protect the card holder data has increased manifold. It is, therefore, no wonder, that companies are suddenly… Continue reading Evolving trends in Payment Card industry

Published
Categorized as Blogs

POS Malware (Stealth tool to steal the valuable Card Details in your Pocket)

Blog Its again a holiday season, everyone is enjoying at their extreme and so are the hackers, so before going reckless  just wait and have a look at the breaches that happened in  the past 2 years. We tried to analyze the exploitation patterns of PoS malwares from the technological as well as physical standpoint… Continue reading POS Malware (Stealth tool to steal the valuable Card Details in your Pocket)

Published
Categorized as Blogs

Adobe Flash Zero-Day Vulnerability – Operation Clandestine Wolf by FireEye

Blog The beautiful June is about to end, the name of the month may have been “sere-month” which implies “dry and withered” or let’s move to Latin and the name becomes Iūnius, meaning “sacred to Juno,” the Roman goddess. So to beat the heat and in the loving memory of the Roman goddess, FireEye as… Continue reading Adobe Flash Zero-Day Vulnerability – Operation Clandestine Wolf by FireEye

Published
Categorized as Blogs

Judgment Day – Quashing of Section 66A of IT (Amendment) Act 2008

Blog On March 24th, 2015 a landmark judgment was delivered by Supreme Court (SC) of India pertaining to online freedom of expression. A controversial legislative Section 66A of IT (Amendment) Act 2008 was declared as unconstitutional by SC. Interestingly, many complaints were made before regarding the widespread abuse and misuse of section 66A. But what… Continue reading Judgment Day – Quashing of Section 66A of IT (Amendment) Act 2008

Published
Categorized as Blogs

Healthcare Interoperability – Privacy & Security

Blog The world of Healthcare has drastically changed in the recent past with the incorporation of IT into Healthcare services. It has completely transformed the way in which healthcare data were traditionally shared, exchanged or interchanged. Today, we see a wide diversity in the way information is created, gathered, Processed and transmitted; and all this… Continue reading Healthcare Interoperability – Privacy & Security

Published
Categorized as Blogs

Why to integrate PCI DSS and HIPAA?

Blog “Compliance” is a big word for IT industry which is driving a significant amount of business. While following different rules, regulations and standards, you are not just avoiding potential fines and penalties but you are also gaining huge customer trust by ensuring their data is safe and secure in your custody. PCI DSS and… Continue reading Why to integrate PCI DSS and HIPAA?

Published
Categorized as Blogs

Risk Analysis – Success Factor for HIPAA Compliance

Blog “Among the areas likely to be a focus of OCR examinations in 2014 is whether organizations have conducted a timely and thorough HIPAA security Risk Assessment, because that was a common weak spot found across the board in the pilot audit program as well as in previous breach investigations” – Susan McAndrew, OCR deputy director… Continue reading Risk Analysis – Success Factor for HIPAA Compliance

Published
Categorized as Blogs
SISA’s Latest
close slider

Webinar

Infosec Report

The current query has no posts. Please make sure you have published items matching your query.