Tarun Kaura, Director, Product Management at Symantec APJ, highlights the most critical industry compliance issues faced by IT security heads and how they can mitigate them.
“WannaCry” is initiated through an SMBv2 remote code execution in Microsoft Windows. It can be blocked by installing patch provided by Microsoft.
A consumer would need every possible argument to ensure that his security when performing a transaction is guaranteed hence he has to be cautious when deciding on the SSL certificate provider.
This week we have newly discovered malware, dual authentication plans, isuues related to lack of IoT security and much more on the cards. Tune in to know more!
The new European General Data Protection Regulation goes into effect next May, but a year might not be enough for firms to get ready
Juan Andres Guerrero-Saade, Senior Security Researcher, Kaspersky Lab’s Global Research and Matt Suiche, Comae Technologies explains about the ‘wannacry’ ransomware attack stages and kill switches.
3-year SSL Certificates lifetime to be reduced to prevent the inherent security and logistics issues.
Indian enterprises are waking up to a new era of cyberattacks as WannaCry spreads its wings.
With all the brouhaha surrounding agile development, security has to be stitched in to every facet of the development lifecycle, and this is what CA Technologies is gunning for.
Read this whitepaper to know how digital security can enable the journey to the cloud
Vulnerability assessment and compliance akin to peanut butter and jelly in security, says Richard Bussiere of Tenable.
Indian banks just can't seem to get their act together when it comes to enforcing cybersecurity protocols. What makes it worse is their hush hush approach to reporting breaches.
On International Women’s Day, top women security experts highlight the various initiatives organizations can implement to mitigate cyber security threats and a word of advice for women CISOs.
Trend Micro shows your enterprise how to defend against attacks, breaches and insider threats.
Targeted attacks are a CISO's biggest nightmare in today's complex multi-vendor IT infrastructure, says Mahendra Negi, Group CFO at Trend Micro.
Catching an insider taking confidential information doesn't happen by chance.
From the growth of business email compromise attacks to cybercriminals using more effective ways to exploit IoT devices, these security issues should serve as a reminder for businesses to be more vigilant.
KasperskyOS aims to protect software and data systems from the consequences of the intrusion of malicious code, viruses and hacker attacks.
A risk council with stakeholders from across the company could be an effective way to get needed resources to mitigate the worst security risks
How IT security teams battle the new wave of employee behaviour to thwart insider threats early and often