Vol 11 04-Jan-10
You're receiving this newsletter because you are a valued contact of Qadit Systems.
Not interested anymore? Unsubscribe. Having trouble viewing this email? View it in your browser.
Qadit Systems Qadit's SecureITy Bulletin
Information is power. Secure IT.

Wishing You All A Very Happy, Secure & Prosperous 2010.

Authentication Challenges in Online Banking

As the challenges increase, new authentication mechanisms are being tested out.
Two authentication mechanisms that can be deployed by banks to manage risks from traditional authentication mechanisms are adaptive authentication and out-of-band authentication. Read More.

Make your Windows XP Secure.

Some tips to make your Windows XP secure ... and faster.
While Windows 7 is getting a rave review (unlike Vista) and more and more users are migrating to Windows 7, Windows XP continues to be prevalent. So as 2010 rings in, here are some tips and tweaks to make your Windows XP secure and faster. Read More.

Asymmetric Encryption - Some Simple Rules

A primer on how asymmetric encryption works.
Asymmetric encryption rules seem to confuse people as to when to use a private or a public key and for what purpose. So what key to use where and when? Learn here.

In Other News & Views:

An introduction to SOX Compliance.
A brief introduction to the Sarbanes Oxley Act. Read More.

Major Security Breaches in 2009
An interesting list of major security breaches in 2009. Read More.

Security Resolutions for 2010
A "wish" list for Information Security Managers for the new year. Read More.

Tech Terminology Demystified - 3G
What is 3G all about?
Find out here.

Know someone who might be interested in this mail? Kindly forward it.

Not interested in receiving this email in the future? Unsubscribe.
Read more interesting news and articles at Qadit's SecureITy blog
For further info contact :
Qadit Systems & Solutions Pvt Ltd,
3 Sarojini Street, Mahalingapuram, Chennai 600 034
Tel: 044-2817 3034 / 044-6547 7225
Email: security@qadit.com
<> ERP Audits <> ISO 27001 <> GRC <> IT Audits <> Website Security Audits <>
Copyright (C) 2009 . All rights reserved.