Author: Jinson E M

Post thumbnail

Data Leakage Prevention DLP should form part of the larger compliance and privacy discussion in your organization. DLP isn’t a technical issue. It’s a business issue. S-squad Global Data Leakage Prevention Assessment provides a snapshot of the strengths and weaknesses of an information security programmer. It involves: A workshop-Based Session With Key Stakeholders. A Discovery…

Read More S-squad Security

Post thumbnail

Business Continuity The need for sturdy backup and recovery systems has never been so intense. Data growth continues unabated. Corporate governance and industry legislation have made executives liable for the security of their corporate information. At the same time, virtualization and cloud computing are reshaping the face of business. If you’re making a move into…

Read More Cloud Computing

Post thumbnail

Globally, mobile operators are waking up to the risks created by vulnerabilities in the SS7 protocol, ranging from fraud and interruption of services to intercepting calls and texts and theft of other confidential data, such as a user’s current location. And while the general public may not have heard of SS7, the growing number of…

Read More VIP Protect

Post thumbnail

Used even more widely than the Internet, signaling networks link individuals, businesses, and smart IoT devices into a solid mobile ecosystem. This ecosystem depends on telecom operators to maintain reliable and protected communication. However, fundamental flaws in signaling protocols—SS7, Diameter, and GTP—and configuration errors in network equipment leave the door open to severe security threats:…

Read More TELECOM SECURITY ASSESSMENT

Post thumbnail

INDUSTRIAL SECURITY INCIDENT MANAGER:  A NEW LEVEL OF INDUSTRIAL CYBERSECURITY Modern industrial facilities are high-powered automated enterprises that control trans port, manufacture, resource allocation, and mining operations 24/7/365. It is of very high priority to ensure their safety, since an attack against such systems would not only put expensive equipment out of operation, but may…

Read More A NEW LEVEL OF INDUSTRIAL CYBERSECURITY