First Successful Batch of Bitcoin Blockchain Training - Proof-of-Work Explained

First Successful Batch of Bitcoin Blockchain Training - Proof-of-Work Explained

We successfully completed our very first batch of Bitcoin Blockchain training programme. It was lauded by the participants, consisting of Engineering students. It covered all the aspects of the entire Bitcoin Ecosystem (theory & practice) including...

Read full article on LinkedIn

Exploring Cryptography (Encryption, Hashing, ...) in Bitcoin Blockchain

Exploring Cryptography (Encryption, Hashing, ...) in Bitcoin Blockchain

In one of the previous posts on Encryption, we actually proved that Everything is Relative. First we said Key is "Encryption" and then contradicted it by saying Key is NOT Encryption, they are different but still both the sentences are correct. OK, let's move on without arguing on that. Let's explore use of Encryption a little further....

Read full article on LinkedIn

Security Audit of eKYC Setup (Aadhaar based Authentication) for MNC

Security Audit of eKYC Setup (Aadhaar based Authentication) for MNC

Am glad to inform that after Security Audit of Unified Payments Interface (UPI) platform, we have successfully completed the Security Audit of eKYC Setup (KYC Services using Aadhaar based Authentication) for one of the MNC Bank's Loan and Credit Card Processes. Performing Compliance Audit is a mandate from Unique Identification Authority of India (UIDAI) for...

Read full article on LinkedIn

Encryption made difficult

Encryption made difficult

D¥~√g÷®¢¶∆f6

The above is the key sentence which is encrypted way of saying EVERYTHING IS RELATIVE. And since Encryption happens with the help of key, this key sentence has a key. The encrypted form of this key sentence is a proof of the meaning of this sentence. By the way you can decrypt this key sentence using ...

Read full article on LinkedIn

Security Review of UPI Setup for MNC Bank

Security Review of UPI Setup for MNC Bank

We just successfully conducted the Security Review of the UPI Setup of one of the MNC Bank's and its Security Testing. It was a mandate from NPCI for onboarding of participating Banks into UPI Payment System. This Audit was a repeat order from them which goes on to prove our capabilities and is also the...

Read full article on LinkedIn

Buffer Overflow Presentation at null Mumbai

Buffer Overflow Presentation at null Mumbai

I had a privilege to address a group of InfoSec professionals & Ethical Hackers from null - India's largest open security community.

The topic of my presentation was Buffer Overflow. It explains the anatomy of Buffer Overflow Vulnerability, its internal working and intricate details in simplest manner followed by...

Read full article on LinkedIn

What to look for in Password Managers?

What to look for in Password Managers?

Why manage Passwords?

Managing Administrative Passwords, be it on Servers (Physical or VMs), Endpoints (Desktops or Laptops), Global Administrators on Cloud or any other Application (used by Business or IT), is a must. Passwords are one of the oldest types of Keys to open the doors to the...

Read full article on LinkedIn

Market Potential for an Award winning Password Manager

Market Potential for an Award winning Password Manager

Breakthrough

t gives me immense pleasure to inform you about the breakthrough - to perform the PoC of our Award winning product HOT endpoint Password Manager (HePM) at one of Private Sector Banks. As a part of PoC, we have made the Application Operational with a successful Installation and...

Read full article on LinkedIn

HePM wins Banking Frontiers' Technoviti Awards 2016 (Innovation)

HePM wins Banking Frontiers' Technoviti Awards 2016 (Innovation)

It gives me immense pleasure to share with you that my efforts have helped my Concern win an Award.

Team Hari Om Tatsat Technologies wins the Banking Frontiers' Technoviti Awards 2016 (Innovation) for the innovative product - HOT endpoint Password Manager (HePM).

Read full article on LinkedIn

HePM featured in Banking Frontiers Magazine as a Unique Product and an Innovative solution that Stands Apart

HePM featured in Banking Frontiers Magazine as a Unique Product and an Innovative solution that Stands Apart

There is brief coverage of "Unique Products" in the Banking Frontiers magazine (Jan 2016 issue) with title: "Technoviti - Tech solutions that Stand Apart". Am glad to inform you that our product HOT endpoint Password Manager (HePM) is featuring in the Magazine as a Unique Product and as an innovative Technology solution that Stands Apart.

Read full article on LinkedIn

Microsoft Says: NOT to use Group Policy to set Local Admin passwords

Microsoft Says: NOT to use Group Policy to set Local Admin passwords

Microsoft Says: NOT to use Group Policy to set Local Admin passwords

Setting administrative passwords using Group Policy (GP) goes against Microsoft's recommendations because it's not secure as the Passwords are stored in an XML file in SYSVOL which is...

Read full article on LinkedIn

Who benefits from Cloud? - A Security perspective

Who benefits from Cloud? - A Security perspective

Cloud – A Security Perspective

Recently, in one of the Seminars, in a Panel Discussion on leveraging Power of Cloud, one of the questions asked to panelist was “What are the factors deterrent to move Data onto Cloud?”. I was surprised that nobody spelled out “Data Security” as a problem to worry about. When the floor was opened for Q&A, I raised a query that...

Read full article on LinkedIn

Encrypt Endpoint Passwords - Secure with Automated Password Management

Encrypt Endpoint Passwords - Secure with Automated Password Management

Typical Scenario of managing Endpoint Local Privileged IDs (PIDs)

The typical scenario depicted in the image above is due to the managing the large number of endpoints manually. Couple that with the facts mentioned below digs a big hole in the Security Posture of the organization, big and...

Read full article on LinkedIn

HOT endpoint Password Manager

HOT endpoint Password Manager

HOT endpoint Password Manager (HePM) - A tool to centrally Secure & Automate access to Privileged IDs (PIDs) on endpoints.

PID passwords are not known to anybody, not even IT team. Passwords stored in Vault can be retrieved anytime on need basis. It effectively enforces privileged access restriction on endpoints only for administrative work and

Read full article on LinkedIn

Security of Business Information, whose baby is it?

Security of Business Information, whose baby is it?

Drawing an analogy of Business Information with the masterpiece of the Divine - our Body, without going into specifics of anatomy. It will work like a magic if we were to develop a inherent cohesive mechanism similar to our Basic Instinct to secure Business Information...

Read full article on LinkedIn

A Magical Wand called "Password"

A Magical Wand called Password

We all possess and use number of these wands and hence we are Jaadugar (Magicians). And remember - Magicians never tell ....

Read full article on LinkedIn

Cracked Databases means Business losses ($$$$$$...)

Cracked Databases means Business losses ($$$$$$...)

Database Privileged Passwords are like Queens in the game of Chess. They are powerful and form the key that protect the King - the DATA. However in Software Applications, unlike Queen in Chess, Database Privileged Passwords are elusive; immobile and dormant like a diamond embedded in mine. This is the deadly combination - elusive yet powerful. However due to ....

Read full article on LinkedIn

21CFR11 - Is Confidentiality a Regulatory or a Business Requirement?

21CFR11 - Is Confidentiality a Regulatory or a Business Requirement?

During one of the marketing meets, prospective, a pharma equipment manufacturer of repute who has already undergone implementation to support compliance with 21CFR11 for few of his products, was of the view that Confidentiality just addresses risks to Business and is not something which Regulator would bother about. I was....

Read full article on LinkedIn

The Journey of Enterprise Data

The Journey of Enterprise Data

The journey of Enterprise Data (Trade Secrets, Intellectual Property, etc.) originates from the Memory of the Business Professionals till it settles down in the Memory of the Computer Systems passing through various Business / IT Processes and IT Infrastructure components. We can ensure Automation & Security of this data at each and every stage of its journey and anywhere in between....

Read full article on LinkedIn

How to put Nuggets to use in your Application Projects?

How to put Nuggets to use in your Application Projects?

What are Nuggets?

SDLC covers the life cycle of a software of which coding constitutes a small part and is 100% responsibility of developers. Although there are tools available for assisting the developers that perform lexical / syntactical analysis and checks security vulnerabilities, the creative piece of work - the logics, the ...

Read full article on LinkedIn

IT Process Automation - by In-house team or by 3rd Party (Experts)?

How to do away - Password never expires setting for Service Accounts

Homegrown IT Automation is an omnipresent boon / issue of present day IT departments. While the department provides Automation Solutions to all others units of the organization in terms of their wide and varied IT requirements, their own shop remains fairly unautomated. Automating Business processes are...

Read full article on LinkedIn

How to do away - "Password never expires" setting for Service Accounts

How to do away - Password never expires setting for Service Accounts

“Password Never Expires” – A dangerous setting.

A lot of organizations has this setting “Checked” for number of their privileged accounts (especially Service Accounts) which is in direct violation of their Password Policy and PCI-DSS v3 Requirement 8.2.4. These Exceptions or Policy Deviations are then...

Read full article on LinkedIn