Data breach

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

Smart and AMRUT cities: IoT and security take center stage

As digitally connected infrastructure becomes ubiquitous, IT implementations have to ensure better data security.

Building a data-driven organization with IoT and AI

IoT and AI will bring large and diverse data sets that will result in new challenges. Here’s how organizations can leverage these technologies to become data driven.

Ashish Thapar: With data breach, prevention is worth a pound of cure

Unless you make resiliency a priority, your data and reputation will remain at risk in digitization world, says Ashish Thapar of Verizon Enterprise Solutions

BFSI sector will be the key target of cyber criminals in 2018

BFSI companies were possibly the biggest target of cyber criminals over the last couple of years. The trend is likely to continue as cyber criminals will continue to find innovative ways to steal identity and money.

Regulatory regime for BFSI: How information security will play a critical role

Regulatory agencies like RBI and IRDAI are taking steps to secure BFSI companies from cyber threats.

The most sought after cybersecurity skills in 2018

The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018

Security budgets of Indian organizations: Where is it heading?

The perpetual catch up game between hackers and CISOs is resulting in a steadily rising cybersecurity budget. We take a look at what’s driving this trend and assess the security roadmap in 2018.

Emerging technologies to combat new age threats

Given the new age threat landscape, CIOs and CSOs across the board can no longer bank upon a fortified periphery that would protect the organization’s crown jewels.

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed?