Your weekly update of everything security!
A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules
Money remains the driving force of DDoS attacks.The growing interest in cryptocurrencies leads to an increase in their exchange-value in the second quarter of 2017.
Svpeng turns keylogger and steals everything through accessibility services.
How to gain visibility and control of data in cloud apps.
This analyst report explores the response organizations must marshal to stand up to the threat of industrialized cybercrime.
There are many different methodologies & controls to improve cyber security defense, which can improve current security controls. But are they adequate in protecting users & client computers?
The Common Vulnerabilities and Exposures (CVE) Program has been cataloging software and firmware vulnerabilities for 18 years. Here’s how it can help you secure your company’s network.
Ransomware is a malicious software, often transmitted by email or web pop-ups, that hijacks a computer and demands a ransom for release.Learn how to preventy Ransomware Attack
Know more about Microsoft Cloud App Security—a comprehensive cloud-delivered service providing deeper visibility, comprehensive controls, and improved security for cloud applications.
Watch to know how to gain deeper visibility, stronger controls and enhance security for your cloud applications with Microsoft Cloud App Security.
The complexity of coordinating multiple point solutions, combined with the leaner budgets and shrinking bandwidth of IT, can make it challenging to evaluate how your mobility strategy stacks up to current market options.
"How many of my Android devices can support device encryption?” - Brad Anderson explains how to deal with this challenge.
In a world that emphasizes connectivity, mobility, sharing and cloud services, business information flows continuously in and out of endpoint devices. Security and risk management leaders must develop a portfolio of solutions to address different aspects of encryption and boundary defense.
Microsoft’s amazing placement validates vision of providing a complete identity and access management solution for employees, partners, and customers, all backed by world-class identity protection based on Microsoft’s Intelligent Security Graph.
With focussed adversaries with creativity, patience and persistence, the enterprise needs to now rethink their strategies to mitigate these threats, says Terence Gomes of RSA Security.
Digital transformation has left a whole host of vulnerabilities attacking the workplace from all quarters. Leo Joseph, Senior Director of Enterprise Sales and Solutions, at HP India, gives us a glimpse at what’s at stake.
As GST knocks on our doorways, Sivarama Krishnan, cybersecurity leader of PwC breaks down how companies have to realign their systems to protect themselves from the new risks brought along with it.
Siva Sivasubramanian of Bharti Airtel shared his insights into what makes the telecom sector a prime target for cyber criminals, and what the industry can do to fight back.