How to gain visibility and control of data in cloud apps.
Learn how can data classification help banks, insurers and other financial service companies ensure their data remains safe
GRC can help you align IT activities to business goals, manage risk effectively and stay on top of compliance.
Siva Sivasubramanian of Bharti Airtel shared his insights into what makes the telecom sector a prime target for cyber criminals, and what the industry can do to fight back.
With India in the midst of a digital revolution, Rudramurthy KG, CISO of Digital India sheds light on the current status, challenges and the way forward for national cybersecurity.
Tarun Kaura, Director, Product Management at Symantec APJ, highlights the most critical industry compliance issues faced by IT security heads and how they can mitigate them.
“WannaCry” is initiated through an SMBv2 remote code execution in Microsoft Windows. It can be blocked by installing patch provided by Microsoft.
A consumer would need every possible argument to ensure that his security when performing a transaction is guaranteed hence he has to be cautious when deciding on the SSL certificate provider.
This week we have newly discovered malware, dual authentication plans, isuues related to lack of IoT security and much more on the cards. Tune in to know more!
The new European General Data Protection Regulation goes into effect next May, but a year might not be enough for firms to get ready
Juan Andres Guerrero-Saade, Senior Security Researcher, Kaspersky Lab’s Global Research and Matt Suiche, Comae Technologies explains about the ‘wannacry’ ransomware attack stages and kill switches.
3-year SSL Certificates lifetime to be reduced to prevent the inherent security and logistics issues.
Indian enterprises are waking up to a new era of cyberattacks as WannaCry spreads its wings.
With all the brouhaha surrounding agile development, security has to be stitched in to every facet of the development lifecycle, and this is what CA Technologies is gunning for.
Read this whitepaper to know how digital security can enable the journey to the cloud
Vulnerability assessment and compliance akin to peanut butter and jelly in security, says Richard Bussiere of Tenable.
Indian banks just can't seem to get their act together when it comes to enforcing cybersecurity protocols. What makes it worse is their hush hush approach to reporting breaches.
On International Women’s Day, top women security experts highlight the various initiatives organizations can implement to mitigate cyber security threats and a word of advice for women CISOs.
Trend Micro shows your enterprise how to defend against attacks, breaches and insider threats.
Targeted attacks are a CISO's biggest nightmare in today's complex multi-vendor IT infrastructure, says Mahendra Negi, Group CFO at Trend Micro.