Hacking

Solutions approach to rule India’s security market: Rajesh Maurya, Fortinet

Hiring specialized people as a security thinker is crucial for modern businesses, says Rajesh Maurya, regional vice president at Fortinet.

US, UK, Aussie blame Russia for 2017 NotPetya attacks

After being held responsible for the attack on the Winter Olympics, Russia is under the spotlight yet again for another cyberattack.

Cyber attack hits Winter Olympics’ servers during opening night

On Sunday, Winter Olympics’ officials confirmed that their servers were hit by a cyber attack during the opening ceremony on Friday at Pyeongchang, South Korea.

Over 4,000 UK, US and Australia government sites infected by global crypto-mining malware

A malicious version of the widely used tool Browsealoud managed to infect more than 4,000 websites to mine digital currency, Monero for over four hours.

Architecture-based, futuristic security to rule in 2018: Bhaskar Bakthavatsalu, Check Point

CISOs will transition from a point product solutions approach to ‘Framework & Security Consolidation’ approach says Bhaskar Bakthavatsalu, MD, Check Point, India & SAARC.

Regulatory regime for BFSI: How information security will play a critical role

Regulatory agencies like RBI and IRDAI are taking steps to secure BFSI companies from cyber threats.

Emerging technologies to combat new age threats

Given the new age threat landscape, CIOs and CSOs across the board can no longer bank upon a fortified periphery that would protect the organization’s crown jewels.

Are bad analogies killing your security training program?

Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help.

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

People, data and network are constants for modern enterprise: George Chang, Forcepoint

To understand and tackle issues of cybersecurity, enterprises must first decode the intersection of users, data and network, says George Chang, Head–APAC, Forcepoint.

Alleged breach compromises a billion Aadhaar accounts; govt in denial mode

A recent revelation exposes the vulnerability of Aadhaar data and the ease in accessing information for a mere Rs 500.

Security trends 2018: biometric hacking, state-sponsored attacks, daring cyber heists

There are only a couple of near-certainties for cybersecurity in 2018: that the market will continue to be buoyant and that attacks will become more sophisticated.