You are here
Home > Posts tagged "security" (Page 2)

CISCO ANNOUNCES TWO NEW CONSUMPTION MODELS FOR ITS TETRATION WORKLOAD PROTECTION

last month Cisco announced two new consumption models for its Cisco Tetration solution for the data center and cloud: Tetration SaaS, the cloud-based solution for cloud-first and cloud-only organizations, and Tetration-V, a software-only version using a virtual appliance for smaller deployments. Both models deliver the same features and functionality as

SECURITY IN PAYMENT SYSTEMS

Payment systems and applications around the world have always put on extra emphasis on security. As payment systems deals with sensitive payment information, breach of those information may end up in account or money being compromised. As a result card transactions in ATMs and POS terminals and online transactions have

ISSUE FESTERS SURROUNDING THE BB HEIST

In the financial world, Bangladesh Bank (BB) cyber heist, happened in February, 2016 is considered as a landmark event; for all the wrong reasons though. Never had been in the history of financial transactions— be it digital or manual—robbers have attempted stealing a billion USD; in case of BB heist, they

THE APP WHICH DOES FINANCIAL TRANSACTION IS NOT LIKE ANY OTHER APPS

Minaoar Hossain Tanzil has become the Managing Director of Dhaka operation of Korean Smartcard manufacturing and payment giant- Kona within just ten years of his professional life. A computer science and engineering graduate from BUET, Tanzil has started his career back in 2007 in CodeCrafters International. While working there, he

OUTLINE TO SECURITY OPERATION CENTER

Organizations ask for industry leading technology to prevent attacks, comply with regulation, monitor technology solution and verify human interaction with technology. There is no inherent way to normalize, aggregate and correlate security events across technologies. Building and maintaining a strong security posture necessitates a centralized effort to monitor, analyze and

THE “S” WORD

It is difficult to talk about security to those who do not have a working understanding about the subject. The difficulty leads to frustration, frustration leads to misunderstanding, which leads to wrong decisions and disasters. The right strategies No matter how awkward, you have to talk about security frankly to your management

CONTAINERIZATION: MEET THE FUTURE VIRTUALIZATION

Over the past decade virtualization technologies have gone from educational tools to full blown IT solutions. Virtualization has many benefits, among them application isolation and utilization of hardware resources are most valuable cause it gives more operational flexibility. Many organizations invest their money in virtualization technology. Virtual environment is easier

HACKATHON: A SUBCULTURE

If you really want to make ‘something out of nothing’, you should read the rest of the piece. Think of the builders, makers, designers or founders – what are they actually doing? The world of startups is flushed with words describing people who are the ‘makers’; And so is the word

RANSOMWARE: PREVENTION Is Better Than DECRYPTION

Last month we have seen one of the biggest cyber-attacks in internet history. The attack was caused through, what came to be known as, “WannaCry” ransomware. It affected more than 200,000 organizations in 150 countries. Several large companies in Spain including Telefónica, as well as British National Health Service (NHS)

Top