Cyber security With the wide adoption of internet for varied applications/programs across the government and enterprise bodies, the online data is exposed to high cyber risk, which has led to increased awareness for cybersecurity. Ongoing adoption of digital technologies, increasing focus on e-governance and recent events such as demonetization drive have compelled the organizations to … More Path to cyber resilience: Sense, Resist, And React
Organizations spend considerable time, effort and cost in identifying, assessing and controlling risks to their business and earnings. Risks could stem from several sources — both internal and external — and include natural disasters, socio-political environment, or business strategy, people, processes and information security. The range is wide.
What can and probably will affect your software licensing process? The general impression about license compliance is that it’s just a game of numbers — “We have installed five licenses of ’X’ software and procured three, so let’s buy two more.” However, licensing involves many more complexities, such as ambiguous clauses and metric definitions which … More Software License compliance: simple arithmetic or much more?
Freeware is proprietary software that is available for use at no monetary cost, though it cannot be modified, redistributed or reverse-engineered without prior permission from the author.  The two most popular examples of freeware are Skype and Adobe Acrobat Reader. 
Software Asset Management (SAM) is quite a simple concept. It revolves around management and optimization of software assets through their life cycle, from purchase to disposal. However, not paying heed to this critical activity, can have dire consequences in the form of bad publicity and monetary implications.
The key to proactive risk management is establishing a risk appetite framework approved by the board
Digitization is driving significant market disruption, particularly in the telecom industry, with telcos as service providers looking at launching new revenue streams to capture the exploding data opportunity in consumer and, lately to a large extent, in the enterprise segment.