Authentication

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

Cyber scammers targeting real estate sector: researcher

Cyber scammers have figured out that the Australian real estate industry is a potential gold mine for social engineering attacks, according to Alex Tilley, a senior security researcher at SecureWorks.

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

Architecture-based, futuristic security to rule in 2018: Bhaskar Bakthavatsalu, Check Point

CISOs will transition from a point product solutions approach to ‘Framework & Security Consolidation’ approach says Bhaskar Bakthavatsalu, MD, Check Point, India & SAARC.

Has MDM become an integral part of the BYOD strategy?

With the rapid adoption of Bring Your Own Device trend, enterprises are pushed to implement MDM tools to effectively prevent business data from falling into the wrong hands.

Arvind Gupta: Digital India is the way forward for industry 4.0

Mobile supercomputing. Drones. Intelligent Robots. Self-Driven Cars.  Blockchain. Virtual Assistants relying on AI. Neuro-technological brain enhancements. Genetic editing. Precision Medicines. The evidence of this dramatic change is all around us and it’s happening at an exponential speed. 

Dinesh Kumar Aggarwal: Encryption is king and the king is nude

In the real world no one keeps the keys of a treasure along with the lock. However, this principle is easily forgotten in the virtual world while using encryption.
 

Are CIOs confident enough to adopt cloud and how can cloud service providers help?

With issues of data residency and reluctance to move away from legacy resolved, the question now arises if the average Indian CIO has enough faith in cloud service providers to store and manage critical business data seamlessly.

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed?

Sophos launches Intercept X with predictive protection

This latest release of the next-generation endpoint protection delivers previously unseen levels of detection and prevention.