Tips
Tips
-
Five ways to prepare a company board for a cyber breach
Five key things that boards need to do to stop their businesses leaking like sieves and potentially going to the wall Continue Reading
-
How to implement risk-based security
Implement a simple process to identify, analyse and prioritise risk without significant investment in time or money Continue Reading
-
Seven secrets of SQL Server Management Studio
SQL Server Management Studio (SSMS) is the principal interface for working with Microsoft SQL Server. However, many subtleties of this powerful tool evade even the most seasoned professionals Continue Reading
-
Securing VMware Infrastructure
Companies are embracing virtualization as a cost-savings measure. Find how to secure your VMware infrastructure. Continue Reading
-
Remote infrastructure management: Eightfold path to nirvana
An organization's choice of partner should be driven by the interplay of three different, ever-changing forces. Continue Reading
-
Audits and compliance requirements for cloud computing
Even as India Inc experiments with the cloud, security concerns play spoilsport. These cloud computing audit and compliance tips will make your journey easier. Continue Reading
-
Security business analyst – a role whose time has come
For effective information security, India Inc requires security business analysts. These should be people who understand security, technology and the business. Continue Reading
-
Mitigate phishing attacks in the cloud: A how-to
As Indian enterprises increasingly move to the cloud, so are phishing attempts. Here are some ways to mitigate the risks of phishing in the cloud. Continue Reading
-
HPC Project Management Office Setup Made Easy
To ensure a successful HPC implementation, establish an efficient high-performance computing project management office. Here’s how you can formulate an HPC PMO that works. Continue Reading
-
Combat social engineering attacks with these mantras
Of all the security threats, those involving the human angle are perhaps the deadliest. Keep social engineering at bay with these tips. Continue Reading
-
High-Performance Computing Work Estimation Checklist
Proper work estimation can go a long way during a high-performance computing project. This work estimation checklist will help you define the scope of your HPC project from the onset. Continue Reading
-
Using ESAPI to fix XSS in your Java code
Customized validation routines are the norm in Indian organizations for fixing vulnerabilities. OWASP’s ESAPI framework may prove to be a better option. Continue Reading
-
Identity and access management (IAM) in the cloud: Challenges galore
Identity and access management (IAM) in the cloud poses never before seen challenges to Indian organizations. Here are some points to keep an eye out for. Continue Reading
-
India Inc.’s field guide to disaster recovery for VMware infrastructure
With companies relying on VMware-based infrastructure, disaster recovery for virtual servers should be woven into existing DR/BC. Here’s how you can achieve that. Continue Reading
-
Three ERP-BPM integration mistakes to avoid
With majority of Indian companies looking at investing in ERP-BPM integration, it’s time we paid attention to a few common mistakes companies tend to make. Continue Reading
-
SAP BO Xcelsius dashboards: How to bypass iPad deployment limitations
Did you know that SAP BO 3.1 and 4.0 do not support the iPad OS? This tip offers workarounds and throws light on SAP’s road map for BO. Continue Reading
-
Leading Indian banking portals contain glaring security lapses
Even as Internet banking portals transform the way Indians bank, vulnerabilities exist in banking websites like SBI, Citibank India, HDFC Bank and ICICI Bank. Continue Reading
-
Tips to overcome information rights management implementation challenges
Information rights management provides foolproof protection for information, but lack of awareness in India often prevents successful IRM implementation. Continue Reading
-
Six business continuity audit guidelines for Indian businesses
In order to be fully prepared to tackle disasters it is important to conduct BCP audits. Use these guidelines for effective business continuity audits. Continue Reading
-
Vulnerabilities in JavaScript: Secure coding insights and tips
JavaScript vulnerabilities are on the rise in India with the entry of HTML5 and faster JavaScript engines. Here are some key problem areas along with antidotes. Continue Reading
-
BPM-ERP integration in four steps
Integrating ERP with BPM can improve organizational efficiency and productivity. Follow these steps for easy integration of ERP with BPM. Continue Reading
-
Top five BI data integration challenges
Solutions to your BI data integration challenges. Experts from HyperCity Retail India dissect BI data integration challenges. Continue Reading
-
Key backup and recovery considerations for big data storage
A streamlined data backup and recovery approach is important for Indian organizations planning to address big data storage. Here are a few aspects. Continue Reading
-
Limitations of two factor authentication (2FA) technology
The common two factor authentication (2FA) techniques used In India have several shortfalls. We take a look at security risks associated with 2FA solutions. Continue Reading
-
Three cybercrime myths and how to counter such risks
Cybercrime risks and threats are now common in India. We dispel common myths and offer measures to help counter any such issues that you might face. Continue Reading
-
Evaluating business continuity options on cloud services
Cloud services enable offsite data storage, thereby providing business continuity on the fly. The benefits are many, but there are issues to watch out for. Continue Reading
-
Cloud likely future for business applications
Outsourcing your business application headaches, together with the flexibility of its leasing model will make the cloud the way forward for large enterprises as well as small businesses. Continue Reading
-
Should CIOs be responsible for social media best practices?
Should CIOs be involved in social media roles within their companies? These social media best practices for CIOs may surprise you. Continue Reading
-
Implement a data integration solution in six easy steps
This is the first installment of a two-part series expert-advice on data integration solution deployment. Continue Reading
-
How centralised storage and server-based computing help IT face BYOD
Study shows that UK and EU IT pros are still scared of BYOD. But IT can overcome these BYOD fears. Here's how. Continue Reading
-
Five essential SIEM training tips for effective teams
Oft neglected in organizations, training an SIEM team is something you can’t ignore. Satish Jagu of Genpact shares tips for effective SIEM management. Continue Reading
-
Data centre cases where PUE or power usage effectiveness doesn't work
IT pros use power usage effectiveness or PUE to determine their data centre's energy efficiency. But it doesn’t always give accurate energy usage details in all data centre cases. Continue Reading
-
Why data centre management tools must evolve in the cloud era
Traditional data centre management tools just aren't cutting it in the age of data centre virtualisation and cloud computing. Continue Reading
-
Cloud architecture security - Part 2: Extrinsic controls
For securing cloud architecture there are some external control measures to be applied. Learn what these extrinsic controls should be and how to apply them. Continue Reading
-
Guide to Windows Azure: Part 3 - How to configure local storage resources
Our Windows Azure tutorial series continues with an explanation of usage of local storage in Azure cloud services. Learn how to best configure local storage. Continue Reading
-
Post Olympics, it isn't game over for data centre contingency planning
London Olympics is over, but IT must not shift away from data centre disaster recovery and contingency planning. Review your plans to prepare your business for future disruptions. Continue Reading
-
Why static code analysis’ benefits go beyond mere VA/PT
While everyone has joined the VA/PT bandwagon, few Indian organizations consider static code analysis viable. We look at where static code analysis scores. Continue Reading
-
Business continuity strategy: Employees are the vital link!
No business continuity strategy can ignore the role that employees play in a crisis. Here’s how you can bring employees to the center of your BC plan. Continue Reading
-
Free IT service catalog templates for the CIO
Creating and updating an IT service catalog can keep your business running smoothly. Check out these free IT service catalog templates on the Web. Continue Reading
-
Shared-nothing live migration: What it means to virtualisation admins
Microsoft’s upcoming Windows Server 2012 Hyper-V and VMware’s upcoming vSphere 5.1 will both include shared-nothing live migration functionality. But how does it help an IT admin? Continue Reading
-
Mobile application security issues and threat vectors in enterprises
As mobile application security threats take on serious proportions, we explore the issues and risks involved for users and enterprises. Continue Reading
-
The benefits of an open source file system for storage
An open source file system can bring huge scalability, parallel file system capability and advanced features compared to those bundled with commercial operating systems. Continue Reading
-
Multiple compliance management fundas from Bank of India
Optimize the management of multiple compliance frameworks in your organization with these tips from Bank of India’s CISO Sameer Ratolikar. Continue Reading
-
Five Tips on EMC VMAX Storage Layout for GPU-based HPC Systems
Scale-out storage systems like EMC VMAX complement a GPU-based HPC cluster, enhancing performance. Here’s how you can configure them for maximum benefit. Continue Reading
-
Together, we can beat cloud security risks
Cloud security risks are a primary concern for IT pros who hesitate to use cloud services. But taking preventive measures for safeguarding the environment isn't that difficult. Continue Reading
-
Software asset management (SAM) program rollout simplified
Implementing a software asset management (SAM) program can be a daunting task for large enterprises. Here is your five-step formula to make it simple. Continue Reading
-
Fancy a multi-hypervisor data centre? Beware of five major problems
Some admins have been touting the idea of a multi-hypervisor data centre infrastructure to save costs. But multiple hypervisors can wreak havoc for IT. Continue Reading
-
Your seven-step ITSM implementation formula
ITSM implementation is all about integrating people, product and process. Here is some expert advice to help you place your ITSM program on a fast track. Continue Reading
-
Security awareness training made easy
A robust security awareness training program for employees is essential. Here’s how you can effectively increase security awareness in your organization. Continue Reading
-
How small and midsize enterprises migrate to cloud-based services
Cloud-based services offer SME IT facilities that were once a luxury only for large businesses. But IT must take one step at a time towards cloud and be wary of vendor contracts. Continue Reading
-
Six SIEM solution optimization tips from Genpact
In the third and last installment of our series on SIEM, Genpact SIEM expert Satish Jagu helps you optimize the performance of your SIEM solution. Continue Reading
-
Time to tame data architecture complexity, but task is tough
Data architecture is close to a misnomer. Complex corporations are striated by applications, beset by politics. Service buses, data governance programmes offer remedies, but don't underestimate task. Continue Reading
-
IT integration and security standardization during M&A
Integration of IT and security during mergers and acquisitions comes with its own baggage. Manish Dave of Essar sheds light on simplifying the process. Continue Reading
-
Early signs of poor business-IT alignment (BITA)
Is your organization suffering a business-IT disconnect? Here is how you can detect it, and move towards better business-IT alignment (BITA). Continue Reading
-
A free risk assessment template for ISO 27001 certification
Risk assessment is the first important step towards a robust information security framework. Our simple risk assessment template for ISO 27001 makes it easy. Continue Reading
-
Microsoft Windows Azure and IaaS capability: Free-trial takeaways
Microsoft Windows Azure cloud platform with its built-in IaaS capability has many use cases. IT should use Azure’s 90-day free trial strategically to test out all its features. Continue Reading
-
BYOD cost optimization: Get the most out of your BYOD program
The BYOD cost vs. savings equation is a complex one to balance. This tip explores how to best optimize costs involved in your BYOD initiative. Continue Reading
-
Cutting through the promises and problems of private cloud services
Private cloud services bring scalability and lower costs, and they allow resource sharing. But without due diligence in areas of licensing and interoperability, IT can’t use cloud effectively. Continue Reading
-
Cloud computing architecture security part 1: Physical and intrinsic controls
Proper design of cloud computing architecture is essential for security. Learn about the physical and intrinsic controls for effective cloud architecture. Continue Reading
-
Tighter security settings on tap for VMware View and PowerCLI
With stringent security settings in place for VMware PowerCLI and View 5.1, admins should reconsider if they should continue using self-signed security certificates in VMware products. Continue Reading
-
Building a hybrid cloud on SaaS, PaaS and IaaS for IT efficiencies
IT pros looking to adopt a hybrid cloud based must strategise for security, IT standards and costs to make their cloud project successful. Continue Reading
-
Five things that can make or break your virtual desktop infrastructure
IT pros looking to implement a virtual desktop infrastructure project must have a strategy for storage, application virtualisation and must understand desktop users to succeed. Continue Reading
-
BYOD policy creation tips from Gartner
The methodology for BYOD policy creation that you follow may well decide how effective it is. Stephen Kleynhans of Gartner shares his recommendations. Continue Reading
-
System administrator guide to the contra-admin approach
A system administrator can benefit by adopting a contrarian approach to system administration. Learn how to use contra-admin effectively as a sysadmin. Continue Reading
-
The new EU data protection regulation: Planning for compliance
The new data protection rule will impact businesses worldwide. Discover quick wins for SMBs and projects for large businesses to move to compliance. Continue Reading
-
BI platform standardization: Step-by-step approach
BI platform standardization is the key to improved data management and clarity on the cost per report. Follow these steps to standardize your BI with ease. Continue Reading
-
SIEM tool implementation tips from Genpact
After selecting the ideal SIEM tool, follow these six tips from Genpact on SIEM tool implementation, to improve efficiency and ensure hassle-free operation. Continue Reading
-
Key BYOD issues to prepare for: Gartner
BYOD issues in diverse environments demand that you assess your organization’s readiness for a formal BYOD program. Gartner highlights key BYOD challenges. Continue Reading
-
ETL tool adoption guidelines for enterprises
An ETL tool could enhance data warehouse performance and result in better ROI than custom ETL code. Here are the factors to consider for ETL tool adoption. Continue Reading
-
Using open source intelligence software for cybersecurity intelligence
Discover the information that may be leaking out of your organisation before hackers use it to launch an attack against your organization. Continue Reading
-
DCIM: what it is and what it does
Data Centre Infrastructure Management holds unquestionable worth, but with the wealth of DCIM tools in the market, IT managers must choose carefully. Continue Reading
-
Gartner’s fabric computing insights
According to Gartner, fabric computing has evolved over the past two years, and is here to stay. Read further for fabric computing implementation insights. Continue Reading
-
Overcoming VMware vShield Endpoint kinks and challenges
VShield Endpoint improves VDI performance by offloading anti-virus processing from guest VMs, but can be tricky to install and manage. Continue Reading
-
Risk management for cloud computing deployments
Cloud risk management involves more than meets the eye. Our expert details risk management for public cloud setups in this multi-part series. Continue Reading
-
“Click-for-tickets” fraud: Teaching users to sidestep Olympic scams
Attackers are expected to use the Games to foster email and Internet fraud. Learn how to help users sidestep Olympics-related scams. Continue Reading
-
Securing NoSQL applications: Best practises for big data security
NoSQL is great for big data, but security is often lacking in NoSQL applications. Davey Winder provides best practises for NoSQL security. Continue Reading
-
Features, updates that make Microsoft Hyper-V 3 worth a second look
Significant enhancements to Microsoft Hyper-V 3 in storage, networking and clustering areas make it an effective and cost-efficient option for large enterprises and SMEs. Continue Reading
-
How can you prevent LinkedIn type of attacks on your business?
Blackhats recently made 6.5 Million LinkedIn password hashes public. A look at what went wrong, and defense options like salted hashes and key stretching. Continue Reading
-
Boost advanced persistent threat (APT) security levels in six steps
Advanced persistent threats (APT) can prove to be deadly for businesses. Here are six best practices to improve your company’s APT security mechanisms. Continue Reading
-
Password security best practices: Change passwords to passphrases
Making passwords more complex hasn’t stopped hackers. Learn why passphrases are better, and surprisingly easy for users to remember. Continue Reading
-
Unix to Linux migration: Five Gartner tips for Indian businesses
Is Linux the new Unix? Will it prove true for your critical server infrastructure? Join us as we take you through Gartner’s Linux migration recommendations. Continue Reading
-
Jobs in cloud computing for information security professionals
There are many new jobs in cloud computing for security professionals. Extend your skills and exploit the opportunities arising from cloud computing jobs. Continue Reading
-
Data centre design: Using engineered racks, pods and containers
IT pros must adopt a new approach to data centre design and consider using engineered racks, pods and containerised systems for better scalability, capacity and efficiency. Continue Reading
-
Prep and test your Olympics 2012 security contingency plans
To maintain information security during the 2012 Olympics, security and IT contingency plans must be tested in several key areas. Continue Reading
-
VMware vSphere 5 storage features: Part two
VMware vSphere 5 storage features include Storage DRS, VSA and data store clusters. IT pros can learn what these features bring to their infrastructure and how best to use them. Continue Reading
-
Information security budgets: Five steps to obtain management buy-in
Getting management to approve security budgets is difficult. Here are guidelines to help you prepare and present information security budgets effectively. Continue Reading
-
Maltego tutorial - Part 1: Information gathering
Maltego is a powerful OSINT information gathering tool. Our Maltego tutorial teaches you how to use Maltego for personal reconnaissance of a target. Continue Reading
-
POS terminal security: Best practices for point of sale environments
Securing point of sale (POS) environments can be tricky. Shobitha Hariharan and Nitin Bhatnagar share comprehensive POS terminal security best practices. Continue Reading
-
Four CRM implementation best practices
Ready to invest in CRM? Follow these best practices to ensure your implementation delivers results. Continue Reading
-
With mobile payments, security teams must move quickly
As employees make payments on their mobile devices, the security team must act quickly to ensure corporate assets remain secure. Continue Reading
-
London 2012 Olympics: Aim for gold with DR, business continuity plans
With 80 days to go before the London 2012 Olympic Games begin, IT pros must review and test their contingency, disaster recovery and business continuity strategies. Continue Reading
-
Continuous data protection: Do you need it?
Continuous data protection solutions are gaining credence, especially for mission-critical subsets of enterprise data. Learn whether CDP is right for you. Continue Reading
-
Using automation, self-service provisioning to build a private cloud
IT pros that recognise cloud computing benefits want to build one behind closed doors. But a private cloud requires automation, self-service provisioning and management planning. Continue Reading
-
Adding cybercrime software demos to security awareness training
Security professionals can use screenshots of cybercrime software in security awareness training to convey the serious threats organisations face. Continue Reading
-
International computer crime requires an international response
As international computer crime increases in scope and organisation, countries must work together to reduce threats from global cybercrime. Continue Reading
-
Prepare for BCP audits with nine best practices
Business continuity plans are ineffective without proper BCP audits. Our expert has some guidelines on how to prepare for BCP audits. Continue Reading
-
Disaster recovery (DR) audit best practices for Indian organizations
The disaster recovery audit is an essential part of minimizing the impact of disasters. Goldi Misra from CDAC shares guidelines for effective DR audits. Continue Reading
-
6 point SIEM solution evaluation checklist
With SIEM solutions gaining steam in India, Satish Jagu of Genpact shares concise tips based on the lessons from his SIEM implementation experiences. Continue Reading
-
5 data loss prevention tool implementation mantras
Even as data loss prevention tools gain momentum, successful implementations call for a few prerequisites. Manish Dave, group CISO, Essar shares tips. Continue Reading
-
VMware vSphere 5: Storage software galore
With features such as VMFS-F, VASA and VM storage profiles, vSphere 5 is VMware’s “storage release”. Learn how these capabilities help virtualisation admins add value. Continue Reading