White Papers

Recent reports have found that Samba, a tool that is used to integrate linux servers with windows environment faces a vulnerability flaw that allows hackers to gain super user permissions on the networks. The impact is large since Samba[...]

Application security can be defined as package of measures undertaken to ensure the security of the application or the system. The flaw can be in the design, development, deployment, upgrade or maintenance of the application. 1. What is Application Security[...]

BYOD is an upcoming trend that is being followed by many enterprises where employees can use there personal devices at workplace. BYOD's easy to use mobile application helps to access shared data smoothly and also provides the advantage of working[...]

Data is pouring out from every possible directions. The outpour of data is not something new, it is a trend that is being continued since 1970's. This enormous data that is generated is around operational activity-system behavior, application performance, user[...]

In todays world we find data everywhere, its like the air we breath surrounded all around us. The data volumes are growing at a fast rate. This fast growth calls for the need of a strategy to process and analyse[...]

AGNI would like to share information on WSO2 Enterprise Mobility Manager (WSO2 EMM), a comprehensive platform that helps to address BYOD challenges. WSO2 MDM solution enables secure over-the-air configuration of WiFi, Email, Password Policy and operations such as enterprise wipe[...]

The use of Wifi wireless networks has lead to a new threat to companies. Many organizations are unaware of the threat this useful technology had in store. 1.What are the threats? Some of the wireless network security risks include: 1.1Unauthorised[...]

1.What is Vulnerability Assessment? Vulnerability assessment can be defined as in-depth evaluation of vulnerabilities in an environment. It helps to determine the risk involved and mitigation measures to be undertaken for the risks. Vulnerability assessments are carried out in Information[...]

1.What is Social Engineering? Social engineering refers to psychological manipulation of people to acquire confidential information. Social Engineering is considered as an overlooked risk in security today. Social Engineering is defined as a synonym for fraud. 2.Social Engineering Techniques: 2.1.Pretexting[...]

1.Introduction It is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data. The process involves identifying the target systems and the goal, then reviewing the information available[...]

© Copyright 2024 Agni Information Systems (P) Ltd.

Top