In the part 2 of the GDPR article, Dan Plastina, will dive deeper into the data lifecycle and how Azure Information Protection can help you provide persistent data protection both on-premises and in the cloud.
The modern dynamic business environment imposes significant cybersecurity challenges. Read this whitepaper to underst Software-defined Security in Modern Software-defined Networks.
Cloud-based big data analytics with machine learning technologies ensures protection from targeted malware attacks, says Nikhil Taneja of Radware.
With over 90 percent Indian businesses revealing that they are at risk of being breached, how should enterprises look at security this year?
As and when the newer technologies reach a level of maturity, businesses will see that systems built on them will streamline everyday activities resulting in saving time and costs.
Cyber criminals are now cashing in on the widespread fear looming on the security landscape. There are a host of malware patches that are actually malwares in themselves.
In IDG's first edition of Security Day, we bring to you the stalwarts of the industry to join in a much needed global conversation on enterprise security.
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.
2017 saw a plethora of cyber attacks globally. Which ones affected India the most?
A recent finding revealed that Indian healthcare companies are spending less than 6 percent of the total IT budget on cybersecurity. Given the spate of recent cybersecurity attacks bringing the industry to its knees, is the healthcare sector a sitting duck for cyber thugs?
Raspberry Pi - a new type of attack successfully allows an intruder to retrieve user authentication data – even when the targeted system is locked.
Ransomware attackers are motivated entirely by money, and they go after your high-value data.Here’s how one common type of Ransomware exploit happens, and what can be done to stop it.
Tarun Kaura, Director, Product Management at Symantec APJ, highlights the most critical industry compliance issues faced by IT security heads and how they can mitigate them.
The technologies to prevent credential theft and abuse, complement the protections used to stop other types of threats, and they bring together new preventative capabilities.
With increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, devices and networks – all hosting sensitive data.
A fine local gathering with talks on advanced social engineering, APT herding, securing smart cities and more, with quality content.
Large Scale network promotes applications infected with the Ztorg Trojan through advertising campaigns. Infected viruses are gaining thousands of new users each day!
The damage done by Dridex banking Trojan was estimated at over $40 million. The ongoing evolution of the malware shows that cybercriminals are not about to bid farewell to this.