Over the last month alone, we have detected several large botnets designed to profit from concealed crypto mining. We have also observed growing numbers of attempts to install miners on servers owned by organizations. When these attempts are successful, the companies’ business processes suffer because data processing speeds fall substantially.
The cyber security is always evolving and you, as a business or as a consumer, need to be ready to adapt to the new technologies, regulations and strategies that will help to develop a safer and more secure internet.
RSA’s VP-APJ, Nigel Ng tells CISOs how to navigate through the jungle that is cybersecurity marketplace.
Organizations should treat security as the business and not as a compliance, says Saravanan Narayanasamy, CEO, GlobeSecure Technologies.
With most organizations adopting mobile and implementing BYOD policies, how will the entry of the device and free WiFi-loving millennial employee affect security of critical data?
Find out how enterprise can prepare for next-gen cyber attack with adequate integrated safeguards.
Since 2014, Kaspersky Lab’s Global Research and Analysis Team (GReAT) has been providing threat intelligence reports to a wide-range of customers worldwide, leading to the delivery of a full and dedicated private reporting service.
How to gain visibility and control of data in cloud apps.
Learn how can data classification help banks, insurers and other financial service companies ensure their data remains safe
GRC can help you align IT activities to business goals, manage risk effectively and stay on top of compliance.
Siva Sivasubramanian of Bharti Airtel shared his insights into what makes the telecom sector a prime target for cyber criminals, and what the industry can do to fight back.
With India in the midst of a digital revolution, Rudramurthy KG, CISO of Digital India sheds light on the current status, challenges and the way forward for national cybersecurity.
Tarun Kaura, Director, Product Management at Symantec APJ, highlights the most critical industry compliance issues faced by IT security heads and how they can mitigate them.
“WannaCry” is initiated through an SMBv2 remote code execution in Microsoft Windows. It can be blocked by installing patch provided by Microsoft.
A consumer would need every possible argument to ensure that his security when performing a transaction is guaranteed hence he has to be cautious when deciding on the SSL certificate provider.
This week we have newly discovered malware, dual authentication plans, isuues related to lack of IoT security and much more on the cards. Tune in to know more!
The new European General Data Protection Regulation goes into effect next May, but a year might not be enough for firms to get ready
Juan Andres Guerrero-Saade, Senior Security Researcher, Kaspersky Lab’s Global Research and Matt Suiche, Comae Technologies explains about the ‘wannacry’ ransomware attack stages and kill switches.
3-year SSL Certificates lifetime to be reduced to prevent the inherent security and logistics issues.
Indian enterprises are waking up to a new era of cyberattacks as WannaCry spreads its wings.