Feature

McAfee Total Protection vs. Norton Security Premium

McAfee and Norton are two of the best-known names in PC security. How do their latest top-level suites match up?

Spear phishing: Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.

What is a CISO? Responsibilities and requirements for this vital leadership role

The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.

Four white hat hackers who shot to fame in 2018

From exposing Aadhaar vulnerabilities to hunting down bugs in Microsoft. Here are four white hat hackers who made waves in the cybersecurity realm this year.

Authentication, encryption and AI – the key components in securing connected cars

The single biggest threat to widespread proliferation of connected cars is data security. A conversation with two giants in the Indian auto space – Tata Elxsi and Tata Technologies brings to light why the threat is of paramount importance and what can be done to bolster security.

Four regulatory changes that rocked enterprise tech in 2018

Here are four major regulatory changes of the year that made regulatory technology (RegTech) rise in prominence in 2018. 

Biggest cybersecurity breaches in 2018 that rocked the Indian threat landscape

Here is a list of the top cybersecurity breaches that affected India in 2018.

Experian exec says biometrics won’t save you from mobile hacks

Experian's annual data breach forecast predicts that biometric hacking will continue to surge as more mobile devices use fingerprint scans and Face ID technology to protect corporate and consumer data. But there are ways to avoid being hacked.

How to hire the best cybersecurity talent

Cybersecurity has one of the biggest skills deficits across all IT verticals meaning finding the right talent isn’t always easy. Here’s how to get it right.

Naysayers ready to do what it takes to see Aadhaar fail: Sivarama Krishnan, PwC

Amidst all the furore around Aadhaar being used for eKYC and UIDAI’s supposed ineptitude, PwC’s cybersecurity leader Sivarama Krishnan denounces the practice of media calling every vulnerability a breach. And he’s got a point.

Best practices for enterprise email security

With 90% of cyberattacks now carried out by email it’s never been more important to make sure your email security strategy is fit for purpose

10 things you should know about dark web websites

Catch a glimpse of what flourishes in the shadows of the internet.