You are here
Home > Posts tagged "security"

E-Insurance and Its Role in business expansion

E-insurance is the use of internet and information technology to produce and distribute the insurance services. E-insurance is providing insurance coverage through an insurance policy, in which all request, proposal, contract, negotiation will be performed online. E-insurance will reduce managerial and administrative costs through the process of business automation, and

Cisco completes acquisition of duo security

Cisco (NASDAQ: CSCO) today announced on October 1 that it completed the acquisition of Duo Security, a privately-held company headquartered in Ann Arbor, Michigan. Duo is the leading provider of unified access security and multi-factor authentication delivered through the cloud. Duo's solution verifies the identity of users and the health of

CYBERSECURITY COMPLIANCE FOR DIFFERENT INDUSTRIES

Taher Ahmed Chowdhury, the Deputy Managing Director of Islami Bank, is a 30 years experienced personality in field of IT and is therefore also the Head of Information & Communication of this bank. He has also played the role of Executive Vice President & CIO of first security of Islami Bank. Mr.

10 STEPS TO SECURE YOUR SYSTEM

The goal of the Information security is Confidentiality, Integrity and Availability are also known as CIA triad. The security people who are protecting, and the bad people who are breaking the security are actually trying to protect and break these three things. The best and easy example is a DDOS

CISCO ANNOUNCES TWO NEW CONSUMPTION MODELS FOR ITS TETRATION WORKLOAD PROTECTION

last month Cisco announced two new consumption models for its Cisco Tetration solution for the data center and cloud: Tetration SaaS, the cloud-based solution for cloud-first and cloud-only organizations, and Tetration-V, a software-only version using a virtual appliance for smaller deployments. Both models deliver the same features and functionality as

SECURITY IN PAYMENT SYSTEMS

Payment systems and applications around the world have always put on extra emphasis on security. As payment systems deals with sensitive payment information, breach of those information may end up in account or money being compromised. As a result card transactions in ATMs and POS terminals and online transactions have

ISSUE FESTERS SURROUNDING THE BB HEIST

In the financial world, Bangladesh Bank (BB) cyber heist, happened in February, 2016 is considered as a landmark event; for all the wrong reasons though. Never had been in the history of financial transactions— be it digital or manual—robbers have attempted stealing a billion USD; in case of BB heist, they

THE APP WHICH DOES FINANCIAL TRANSACTION IS NOT LIKE ANY OTHER APPS

Minaoar Hossain Tanzil has become the Managing Director of Dhaka operation of Korean Smartcard manufacturing and payment giant- Kona within just ten years of his professional life. A computer science and engineering graduate from BUET, Tanzil has started his career back in 2007 in CodeCrafters International. While working there, he

OUTLINE TO SECURITY OPERATION CENTER

Organizations ask for industry leading technology to prevent attacks, comply with regulation, monitor technology solution and verify human interaction with technology. There is no inherent way to normalize, aggregate and correlate security events across technologies. Building and maintaining a strong security posture necessitates a centralized effort to monitor, analyze and

THE “S” WORD

It is difficult to talk about security to those who do not have a working understanding about the subject. The difficulty leads to frustration, frustration leads to misunderstanding, which leads to wrong decisions and disasters. The right strategies No matter how awkward, you have to talk about security frankly to your management

Top

Click Here To Buy Magazine 


Connected with us