Application Security

Solutions approach to rule India’s security market: Rajesh Maurya, Fortinet

Hiring specialized people as a security thinker is crucial for modern businesses, says Rajesh Maurya, regional vice president at Fortinet.

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

Union Budget 2018: Impressive IT investments, but no cybersecurity measures

FM Arun Jaitley may have announced substantial allocations to new technologies but without a proper cybersecurity framework, IT leaders wonder where it will lead.

2018 will be the year of synchronised security: Sunil Sharma, Sophos

Synchronized security is the right ammo for businesses of all sizes, especially in this highly digitized world says Sunil Sharma, MD, Sophos India.

The most sought after cybersecurity skills in 2018

The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018

Security in the era of cloud and IoT: The CISO’s job gets tougher

CISOs will face new challenges as enterprises transition to cloud and adopt IoT. Here’s what they can expect to manage in the new year.
The era of cloud and IoT has heightened the role of the Chief Information Security Officer (CISO) in enterprises. Increasing sophisticated threats complicated by the lack of a skilled security workforce add to the challenges

Millenials more likely to use biometrics, MFA to improve personal security: Study

IBM Security’s global study shows how Indian respondents are more technology-inclined compared to their global counterparts.

Rise of BYOD, BYOA adds to network security woes across organizations: Fortinet

Fortinet advises CISOs to mitigate risks from BYOD and BYOA by implementing a ‘layered’ cybersecurity approach with increased visibility

Crowdstrike-Valuepoint Techsol's ML-based platform aims to secure enterprises on cloud

Crowdstrike’s new security platform will be deployed and hosted from partner Valuepoint Techsol’s SOC.

This hacker is rating software security Consumer Reports-style

The Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices.

People, data and network are constants for modern enterprise: George Chang, Forcepoint

To understand and tackle issues of cybersecurity, enterprises must first decode the intersection of users, data and network, says George Chang, Head–APAC, Forcepoint.