Data breach

Fortinet introduces ML capabilities to its FortiWeb web application firewall

The new innovations to FortiWeb provide a dramatic increase in detecting web application threats with nearly 100 percent accuracy.

No, We Didn't Get Hacked: Dixons' PC World loses customer data in cyber attack

As reported by Reuters earlier this week, British mobile phone and electrical retail chain Dixons Carphone has reported their second major cyber attack in three years after discovering unauthorised access to the payment data of PC World retail customers.

Partner Content
Anatomy of a Data Breach: How to adopt a proactive approach

With a phenomenal shift towards digitization, the vulnerability towards cyber breach is on the rise for almost all companies.

Partner Content
KIMS Group of Hospitals safeguards their data with Seqrite EPS

Seqrite EPS is a cost-effective and an efficient endpoint security solution. 

Partner Content
The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Most big surveys reckon that human errors are at the heart of security incidents.

Partner Content
How cybersecurity laws play an important role in securing your organization

Over the last few years, the key buzzword has been cybersecurity, thanks to the number of breaches and vulnerabilities that have occurred.

PageUp admits personal data “probably” accessed

Australian software-as-a-service provider, PageUp on Tuesday finally admitted that customer data was “probably” accessed following a data breach last month.​

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

5 major cyberattacks and hacks of 2017

As we approach IDG Security Day on June 21, here is a glance at the major hacks, threats and ransomware attacks that shook the industry last year.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Software is the key enablement for defining security perimeter: Makarand Joshi, Citrix

Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.

Partner Content
GDPR has arrived: Check your preparedness

Organizations across the world are scrambling to ensure they are in compliance with the GDPR regulations. Has your company done its due diligence?