Keypoints for Auditing a Data Center

Auditing a Data Centre – Key points Data centres house the data, applications and access critical to the success of many businesses. Our data centre must be secure and resilient in order to keep our enterprise running at maximum productivity, protecting our profitability, productivity and reputation. The audit or health checks (in terms of Information …

How to find PHP version in Linux

There are many instances when we want to know which php version our server supports. It matters when you are trying to install some open source application like phpfreechat or Drupal 7.x it requires minimum PHP version to work. If you have access to console then there are various way to know else you can …

Risk Identification Process – Burning Challenges

Risk Identification Process – Burning Challenges Risk identification is one of the most important factor which decides the fate of Risk Management in an Enterprise or organization. Some of the key challenges involved are: Broad Statement Risk Some enterprise identify the risks which are too broad in nature. Example includes Risk to Brand reputation Compliance …

Changes to ISO 27001: What’s new in the 2013 ISO 27001 update?

ISO 27001:2013 is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) under the joint ISO and IEC subcommittee. It is a specification for an information security management system (ISMS). The recent standard ISO 27001:2013 replaced the ISO 27001:2005 standard. Mentioned below are the significant changes: …
  Home