Browser Forensics

Browser Forensics

When we say Digital Forensics, we mean the process by which we identify the crucial evidence, which is then extracted using various methods, and the same is preserved to be presented in the court of law, after proper documentation. This is a more of an art than science, in which we hunt for crucial electronic…

Data Destruction

Data Destruction

  Policy for Destruction: Does the above phrase ring a bell? Do you wonder why there should be a policy in place for “Destruction”. Are we living in a hypocritical world? Well, some destructions are for good!!!! Organizations that deal a lot with sensitive data need these “destructions” at its best. The trouble is “deleting”…

Data Ownership

Data Ownership

Introduction Let’s start with the most important question which many organizations face today – Who is responsible for implementing data protection?? You would be hearing various responses ranging from “it’s everybody’s job”, “it’s teamwork”, to “its business analysts’ responsibility” etc.  In such a scenario where does the obligation rest? In an ever-changing business / competitive…

The Payment Card Industry Data Security Standard

The Payment Card Industry Data Security Standard

Introduction Digital payment & economy is growing at an astounding pace across the globe irrespective of the continents. In the preceding year, the global transaction value was US$3859 Billion (source: Statistica). With such volumes rising year after year, Fintech organizations face a lot of challenges in placing the appropriate checks and balance to ensure that…

DevSecOps

DevSecOps

Introduction Before the advent of DevOps, most organizations performed their products’ security checks at the final stages of the software development life cycle (SDLC), irrespective of the development model adapted. Since the focus was predominantly on application development, security was deemed to be less important at other stages. Security checks are performed very late in…

Sourcing Using Google

Sourcing Using Google – Part 3

Bells & Whistles for Sourcing While we understood how Google+ has been steadily growing in popularity and size backed by powerful search options from Google, we also saw what kind of Boolean searches can be performed. In this final part of this series, let us now look at how these Boolean functions can be converted…

Sourcing Using Google

Sourcing Using Google – Part 2

Boolean Search Basics   In this Part 2 of the 3-part series on Google sourcing, let us explore and understand how Boolean search functions. Boolean search on Google is your best companion when sourcing candidates. Boolean search allows users to combine keywords with operators such as AND, NOT and OR to produce more relevant results.…

Sourcing Using Google

Sourcing Using Google – Part 1

Discover Google+ Google search offers so much more precision, nuance and power if you know how to use Boolean commands. If you’re a recruiter, the most effective way to source good job candidates on Google is to incorporate Boolean search operators into your search engine sourcing strategy. In a 3-part series, we are going to…