Quantcast
Channel: AT&T Networking Exchange BlogBindu Sundaresan – AT&T Networking Exchange Blog
Browsing all 31 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

A Feast For the Mind: Enrich Yourself as a Security Professional

I was inspired to write this post after reading an article my husband, Bharath Ramamoorthy, an architect wrote to inspire his team to take up courses as part of continuing education. Humans, by nature,...

View Article



Image may be NSFW.
Clik here to view.

6 Ways Social Media Impacts Security For Business

Social media has definitely transcended the generation gap. My parents have taken to Facebook to keep in touch with extended family and to learn of updates of the second generation. The other day I was...

View Article

Image may be NSFW.
Clik here to view.

Enabling the Promise of Secure Health

With an unsustainable growth rate that consumes 18% of the U.S. gross domestic product, the healthcare industry is at a “tipping point” for fundamental change. Technology will be the enabler for the...

View Article

Image may be NSFW.
Clik here to view.

There’s an ‘App for That’… EVERYWHERE. On-Prem, On-Demand, On-the-Go

Applications are ubiquitous. They run on our cars, smart phones, television, traffic lights, smart grids and medical devices. An application is something that we cannot get away from in today’s world....

View Article

Image may be NSFW.
Clik here to view.

Information Protection: Empowering Business Innovation

In 2011, businesses experienced an upsurge in high profile attacks by hacker activist groups (a.k.a. “hacktivists”) — such as Anonymous and LulzSec — and increasing monetization of attacks by organized...

View Article


Image may be NSFW.
Clik here to view.

Mobile Payments Bring New Opportunities – and New Threats

If modern technology is a universal language, today our world is getting schooled in innovation. Mobile devices have become an integral part of our lives. We game on them, surf on them, bank on them,...

View Article

Image may be NSFW.
Clik here to view.

Hospitality Industry Targeted by Cyber Criminals

Going on a vacation? How safe do you think your information is at the resort you just booked? I was reading a recent data breach report that said hotel and restaurant Point of Sales (POS) systems are...

View Article

Image may be NSFW.
Clik here to view.

The Security Investment Dilemma

I recently had the opportunity to attend the ABHS Leadership Program (ABHSLP) Leadership Development Conference. I had the opportunity to spend time with over 100 of our L2 managers representing every...

View Article


Image may be NSFW.
Clik here to view.

The Company You Keep: Reducing Exposure through Third-Party Risk Management

Growing up, my mom used this phrase quite often: “You are known by the company you keep.” Today, in the world of outsourcing, offshoring, integration, and collaboration, this adage is all the more...

View Article


Image may be NSFW.
Clik here to view.

Rethinking Your Security Program To Support The Perfect Storm

The need to stay connected and informed is propelling the growth of new technologies, such as mobility, social media, collaboration, cloud services, and communication. We have entered the age of...

View Article

Image may be NSFW.
Clik here to view.

Cybercrime Today

We are definitely seeing the role of innovation and the impact on human culture today. As 2012 came to a close, at social gatherings we witnessed folks old and young use iPads, tablets, and smartphones...

View Article

Image may be NSFW.
Clik here to view.

The Final Rule Is HERE

On January 17, 2013, the U.S. Department of Health and Human Services (HHS) issued a press release announcing publication of the final omnibus rule with Modifications to the HIPAA Privacy, Security,...

View Article

Image may be NSFW.
Clik here to view.

Security Spotlight On Consumer Packaged Goods

When it comes to consumers, the experience is everything. The most successful Consumer Packaged Goods (CPG) companies are already leveraging interactive marketing and social media to drive awareness of...

View Article


Image may be NSFW.
Clik here to view.

There’s an ‘App for That’… EVERYWHERE. On-Prem, On-Demand, On-the-Go

Applications are ubiquitous. They run on our cars, smart phones, television, traffic lights, smart grids and medical devices. An application is something that we cannot get away from in today’s world....

View Article

Image may be NSFW.
Clik here to view.

Back To The Basics With Data Security

These days, we use mobile devices for just about everything, from online purchases while we’re standing in line at the coffee shop to managing our bank accounts and storing confidential data. “Human...

View Article


Image may be NSFW.
Clik here to view.

Are You In Business To Make Money Or Lose It?

Are you in business to make money or lose it? For most people, the answer to this question is a no brainer! As a security professional, I truly believe that security can impact your bottom line. It is...

View Article

Image may be NSFW.
Clik here to view.

Security — A “Nice to Have” or a “Must Have”?

As the New Year begins, everyone is looking to learn more about upcoming 2014 technology and security trends. Experian’s 2014 Data Breach Industry Forecast predicts that new security threats and...

View Article


Image may be NSFW.
Clik here to view.

Are Your Phone and Your Mobile Apps a Digital Reflection of You?

This morning, after I used the weather app, the alarm clock app, and the navigator app to get to work, I realized my phone has become a digital reflection of me! While we often think of mobile apps as...

View Article

Image may be NSFW.
Clik here to view.

Information Protection is Essential for Today’s Consumer Experience

Enterprise and business clients are usually the first to adopt the newest technology. Representing a variety of sectors, these companies leverage the latest and greatest systems for improving sales,...

View Article

Image may be NSFW.
Clik here to view.

Threat intelligence tops the new cybersecurity agenda

Security intelligence is the component missing from many organizations’ defensive arsenals. Intelligence places IT security threats in context, adding information about “who” and “why” to the technical...

View Article
Browsing all 31 articles
Browse latest View live




Latest Images