Money remains the driving force of DDoS attacks.The growing interest in cryptocurrencies leads to an increase in their exchange-value in the second quarter of 2017.
Microsoft Intune gives you a diverse set of tools for managing your complex mobile environment. Intune’s innovative combination of mobile application management and device management options gives you flexibility in how you manage and secure mobile productivity.
The adoption of mobility and cloud services has changed the way business users interact with their devices, apps, and corporate data, increasing the options for users to connect and be productive at any time.
Learn how can data classification help banks, insurers and other financial service companies ensure their data remains safe
From data leaks to the open source platform the network is being hosted on, experts have raised concerns from time to time about GST-related security issues. Here's a brief insight into a few of them.
A gut feeling of old acquaintances, new tools, and a common battleground
Organizations need to play smart to prevent Ransomware attacks. Creating regular back-ups of your data will go a long way in your preparedness to tackling cyber-attacks.
The country’s cybersecurity strategy is lacking and security vendors can help in rectifying this situation, says Nilesh Jain of Trend Micro.
Adding more layers of defenses only adds to the complexity of the problem. It’s far more effective to mature the organization’s IT security processes and make it a strategic enabler of growth.
After an analysis of the encryption routine of the malware used in the Petya/ExPetr attacks, it has been found that this malware campaign was designed as a wiper pretending to be ransomware.
With focussed adversaries with creativity, patience and persistence, the enterprise needs to now rethink their strategies to mitigate these threats, says Terence Gomes of RSA Security.
Digital transformation has left a whole host of vulnerabilities attacking the workplace from all quarters. Leo Joseph, Senior Director of Enterprise Sales and Solutions, at HP India, gives us a glimpse at what’s at stake.
Siva Sivasubramanian of Bharti Airtel shared his insights into what makes the telecom sector a prime target for cyber criminals, and what the industry can do to fight back.
Kunal Pande, partner – IT advisory of KPMG illustrates how risks in the new age of robotics and AI need to be mitigated by enterprises.
Charru Malhotra, Associate Professor of e-Governance and ICT at the Indian Institute of Public Administration, discusses the importance of bolstering security for the smart and digitally inclusive nation.
With India in the midst of a digital revolution, Rudramurthy KG, CISO of Digital India sheds light on the current status, challenges and the way forward for national cybersecurity.
With over 90 percent Indian businesses revealing that they are at risk of being breached, how should enterprises look at security this year?
Cyber criminals are now cashing in on the widespread fear looming on the security landscape. There are a host of malware patches that are actually malwares in themselves.
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.
The distribution of rooting malware through Google Play is not a new thing. this Trojan not only installs its modules into the system, it also injects malicious code into the system runtime libraries.