Security & Compliance

  • IBM to Protect Personal Data in the Cloud

    IBM today announced it has patented the design for a data privacy engine that can more efficiently and affordably help businesses protect personal data as it is transferred between countries, including across private clouds.

    Read more..
  • Security Adaptation of IAM and Cloud

    The emergence of cloud computing and its services has defined how cloud systems should embed security and should look at the concepts of Identity and Access Management (IAM) while approaching enterprise security. With the adaption of IAM into cloud, and as en

    Read more..
  • IBM Launches Intelligent Cloud Security Portfolio

    IBM today announced it has built the industry’s first intelligent security portfolio for protecting people, data and applications in the cloud. Built on IBM’s investments in cloud, security and analytics software and services,

    Read more..
  • McAfee Delivers New Product Portfolio For SMBs

    McAfee, part of Intel Security announced a new line of security suites that provide small and medium-sized businesses (SMBs) with a simple, flexible and cost-effective way to safeguard both their data and devices. McAfee Small Business Security suite is optim

    Read more..
  • Hacking a Living Room

    Popular connected home entertainment devices pose a real cyber security threat due to vulnerabilities in their software, and a lack of elementary security measures such as strong default administrator passwords and encryption of Internet connection.

    Read more..
  • Kaspersky releases free scanner app for Android devices

    In order to safeguard users against a number of Android vulnerabilities discovered in recent months, Kaspersky Lab has released a free mobile application for the platform. Kaspersky Fake ID Scanner scans smartphones and tablets for vulnerabilities that put us

    Read more..

Premier source for thought leadership and latest updates on Cloud Computing to our extensive audience of CIOs and IT Leaders.

Address:J-100, Saurabh Vihar, Badarpur,New Delhi - 110044 (INDIA)

Phone:+91-11-32024924

Email: info (at) itsbsm (dot) com

ShellShock: All You Need to Know About the Bash Bug vulnerability

A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems...

Tinba Reloaded… Attacking Banks Around the World

Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware...

Big… BadUSB Malware Hack Exploit Ahead

This newly discovered flaw in USBs, dubbed BadUSB, that allows them to become automated hacking tools is the latest challenge for data security professionals...

ShellShock: All You Need to Know About the Bash Bug vulnerability

A new vulnerability has been found that potentially affects most versions of the Linux and Unix operating systems...

Tinba Reloaded… Attacking Banks Around the World

Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware...

Big… BadUSB Malware Hack Exploit Ahead

This newly discovered flaw in USBs, dubbed BadUSB, that allows them to become automated hacking tools is the latest challenge for data security professionals...