Authentication

What is single sign-on? How SSO improves security and the user experience

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

Sophos launches advanced email protection solution

SophosLabs research discovered that 75 percent of malware in an organization is unique to that organization which indicates the majority of attacks are zero-day

10 questions to ask when considering a cloud services provider's encryption solutions

Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.

Top six security and risk management trends: Gartner

Analysts will explore the trends security leaders face during the Gartner Security & Risk Management Summit, September 10-11, 2018, London, U.K.

4 critical considerations to evaluate and choose your DDoS solution

For a generation that breathes online, one of the biggest threats to watch out for is DDoS attacks. To understand this menace better and choose the right solution for your organization, here we dive into the four critical considerations needed for evaluating DDoS solutions.

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

Best computer security tips

Computers are such an integral part of life now, that it can be easy to take them for granted. But, with so much of our personal, financial, and legal information accessible through your PC, laptop and phone, it’s essential that we keep them and Windows 10 secure.

The most notorious hacker groups

Today increasingly sophisticated cyber attacks are crafted, honed, and improved by shady groups of hackers, often using custom tools that are directed at high value people, businesses, or even countries.

Amar H Shah

Ashok Leyland implemented a mobile security solution with the ability to implement geographic, device and user based security policies. 

Meetali Sharma

Meetali Sharma conducted an internal risk assessment with respect to the security standards, identified gaps, and made numerous changes within the environment. This included physical segregation, VLAN segmentation, dual factor authentication, policy alignment, and employee trainings. 

Jayan N

At Servion Global Solutions, Jayan N implemented an end-point protection suite with advance malware protection software to safeguard the organization against ransomware/malware attacks.
 

Chinmay Shrikant Pradhan

At NSE IT, Chinmay Shrikant Pradhan led implementation of advanced cybersecurity offerings, covering a range of technologies to validate data across applications and processes, along with media management.