maravis.com

Exploring Information Security

  • Posts
  • Articles
  • About Siva
    • Resume of Siva Ram
    • Contact Siva Ram
Contact Siva Siva's Resume

HTTP Public Key Pinning – Do or don’t?

Siva Ram August 31, 2017

Should you implement HTTP Public Key Pinning (HPKP) for your site? Some reasons I don’t like it in its present form and when it can be acceptable.

Apps, General, Posts, Privacy, Security

Privacy, Security

Who is responsible for bank fraud?

Siva Ram May 21, 2016

Who is responsible for payment fraud? Why customers also need to get involved and cannot just depend on service providers to protect them.

Cloud, Fraud, General, Posts, Security

Fraud, General, Security

Top ten passwords used on Ashley Madison

Siva Ram September 12, 2015

The top ten most used passwords on Ashley Madison shows that people have not learned much about using strong passwords, even with all the data breaches that have occurred recently.

General, Posts, Privacy, Security

authentication, General, Privacy, Security

Dare to be the best – A recipe for success

Siva Ram September 1, 2015

In this article.. Escape the confines of your role Love what you do Find out what you do well Find your place in the team Balance the big picture and details Show initiative Own your work Let others own their…
Read more

Articles

Business email compromise attack

Siva Ram August 23, 2015

Business email compromise (BeC) is an emerging fraud vector that can result in huge losses to corporations and individuals. The way the attack happens makes it very difficult for financial institutions to prevent these attacks and customers ultimately end up taking the losses.

Fraud, General, Posts, Process

Fraud, General, Process

Post navigation

1 2 3 … 26 Next →

Dare to be the best – A recipe for success

Dare to be the best - A recipe for success

This article lists some of the things I have learned from my experiences at the various workplaces that I have been. Every person is different and I expect each person to understand and absorb the content differently. Hopefully, these points will help you be at your best.

Read more...

Business email compromise attack

Business email compromise attack

Business email compromise (BeC) is an emerging fraud vector that can result in huge losses to corporations and individuals. The way the attack happens makes it very difficult for financial institutions to prevent these attacks and customers ultimately end up taking the losses.

Read more...

Controls for use of production data in testing

Controls for use of production data in testing

In some cases, using production data for testing is unavoidable. When such a situation arises, what controls should be applied to the data to keep it secure?

Read more...

© 2008 - 2018 maravis.com
The use of this content on other websites without permission breaches copyright.