Quantcast
Channel: Srinivas Kumar's blog
Browsing latest articles
Browse All 5 View Live

Healthcare Principles and IT Security

Applying the principles of healthcare to IT security is really a good analogy in the sense that the problems and solutions (or lack thereof) have similarities. The IT patient is really the “living”...

View Article



Attack Lifecycle Modeling

Every form of traditional warfare has used a bag of age-old tactics and strategies. The defender builds watchtowers, deeper moats, and higher walls to observe and block the intruders and protect the...

View Article

Why Security Needs to Handle Change-Ups

In baseball, the change-up is a pitch that arrives much slower to the plate. The reduced speed coupled with a deceptive delivery style is intended to confuse the batter's timing. In similar style,...

View Article

Threat Vectors

The old fashioned threat vectors were merely scratching at the surface. Emerging advanced malware is poised for Attack-In-Depth exploiting users, processes and systems alike, requiring a measured...

View Article

THE EPICENTER OF CLOUD COMPUTING

Trust is at the epicenter of Cloud Computing and the single most powerful enabler for cloud migration, and probably even more compelling than promises of savings in CapEx and OpEx. Moving data to the...

View Article

Browsing latest articles
Browse All 5 View Live




Latest Images