
Author: Deepesh Kumar


Keypoints for Auditing a Data Center

Risk Identification Process – Burning Challenges

Changes to ISO 27001: What’s new in the 2013 ISO 27001 update?

SMAC (Social, Mobile, Analytics and Cloud)-The emerging Enterprise IT model
