Authentication

Pune-based Cosmos Bank loses Rs 94 crore to hackers

A malware attack helped hackers clone thousands of debit cards and siphon off over ₹94 crore from Cosmos Bank over a period of two days.

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

What are phishing kits? Web components of phishing attacks explained

A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.

Partner Content
POS security vulnerabilities for retail industry

One of the most publicized POS breaches happened with American retailer, Target in 2013 where 41 million customer payment card accounts and contact information for more than 60 million Target customers were affected.

Gemalto - Security to be free

For those shaping the digital interactions of tomorrow, Gemalto provides the digital security that enables the trusted connections of today.

Hackers break into Reddit's systems

Global online forum Reddit has revealed a hacker broke into a few of its systems accessing user data between 14 June and 18 June.

Cisco pays cool USD 2.3 billion for hot security company Duo

Cisco says integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers quickly secure users to any application on any networked device.

Blockchain beyond Bitcoin: How Singapore is using blockchain outside of cryptocurrencies

Blockchain is not bitcoin and the digital ledger’s uses go far beyond cryptocurrencies

What is single sign-on? How SSO improves security and the user experience

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

Sophos launches advanced email protection solution

SophosLabs research discovered that 75 percent of malware in an organization is unique to that organization which indicates the majority of attacks are zero-day

10 questions to ask when considering a cloud services provider's encryption solutions

Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.

Top six security and risk management trends: Gartner

Analysts will explore the trends security leaders face during the Gartner Security & Risk Management Summit, September 10-11, 2018, London, U.K.