Advanced Persistent Threats

How H-Energy tackled emerging threats with an agile, scalable security solution

From safeguarding a massive mobile workforce to deploying an agile, scalable security solution, here’s how Vikas Gupta, CIO at H-Energy future-proofed cybersecurity at his organization.

Four white hat hackers who shot to fame in 2018

From exposing Aadhaar vulnerabilities to hunting down bugs in Microsoft. Here are four white hat hackers who made waves in the cybersecurity realm this year.

Symantec makes double acquisition to boost endpoint security

Symantec has enhanced its security portfolio through acquiring mobile application provider Appthority and advanced persistent threats specialist Javelin Networks.

Kaspersky Cyberinsights 2018: Cybersecurity in the age of digital transformation

The Kaspersky Cyberinsights 2018 two city series in India, as part of its pan-APAC series, put the spotlight on the central theme of “Building Cyber Defence and Resilience with Adaptive Security Framework”. 

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Software is the key enablement for defining security perimeter: Makarand Joshi, Citrix

Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.

Aditya Birla Group suffers cryptojack attack; 2000 computers used for mining Monero

First detected at an overseas subsidiary of the group a month ago, the malware spread to manufacturing and other services companies of Aditya Birla group. Monero was the currency mined.

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.

The clearer the CSO role, the easier to get budget approved: Mushtaq Ahmed, CSS Corp

For an organization to be secure from any cyber threats, investments should be made in technology, people, and policy, says Mushtaq Ahmed of CSS Corp.

ManageEngine fixes critical zero-day vulnerabilities that could affect close to 10,000 companies in India

Here’s all you need to know about ManageEngine’s zero-day vulnerabilities, and what the company has done to remediate the problem