Secure Mobile Device For Enterprise

With the introduction of cool mobile devices available for corporate world, executives feel their existing blackberry out of fashion. For a while, blackberry devices ruled the corporate world for mobile…

Risk Based Authentication

The technique that uses both contextual and historical user information along with data supplied during an internet transaction to assess the probability of whether a user interaction is authentic or…

Security Architecture Framework

Security Architecture Framework should provide comprehensive view of security in the enterprise and be the reference model for any security architecture artifacts and all design.

Internet Traffic Shaping in Canada

ISPs wants to shape internet traffic while Canadians are still waiting to know the effects on Privacy if two bills – Investigative Powers for the 21st Century Act and the Technical Assistance for Law Enforcement in the 21st Century Act – becomes law.