Access control

Why e-payment companies give RBI’s data localisation mandate a thumbs-up

Amidst the widespread furore and the general perception of RBI’s data localisation mandate being a spoke in the wheel for digital payment companies, the latter believes RBI’s diktat is a step in the right direction.

Ajay Gupta appointed country director at Netskope India

Forcepoint’s former sales director Ajay Gupta will lead India business at Netskope.

Cisco sets USD 2.3B deal for unified access, multi-factor authentication security firm Duo

Cisco closes on its $2.35 billion deal with network identity, authentication security firm Duo. The deal will help customers securely connect any user to any application on any network.

Partner Content
Digital Signatures: Making e-Procurements Safer

As technology evolves, so do hackers. Armed with a deviously brilliant mind and superior knowledge of the latest technologies, today’s hackers are breaching organisations’ cybersecurity with surprising ease. 

Partner Content
Partner Content
4 Ways to Breach-proof Your Bank’s ATMs

‘ATM Cash-out’ is a meticulously planned, highly choreographed, global cyber attack wherein hackers breach a bank or payment card processor’s cybersecurity systems and use cloned debit cards at multiple ATM machines around the world to fraudulently withdraw millions of dollars within a short period of time. 

What are Amazon Zelkova and Tiros? AWS looks to reduce S3 configuration errors

Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments.

Partner Content
Your enterprise data may be just a search away: Secure it now

There are a whole host of reasons why organizations should consider encrypting their sensitive data: for protection, for legal reasons, to comply with global compliance policies and safeguard customer interests. 

Partner Content
Tailgating: Security Risks Involved

Let’s visualize another scenario. A group of employees go down to have lunch. One of them swipes their own card and holds it open for everyone to go through. He doesn’t notice that someone else has slipped inside while the door was open.

Cisco pays cool USD 2.3 billion for hot security company Duo

Cisco says integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers quickly secure users to any application on any networked device.

What is single sign-on? How SSO improves security and the user experience

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.