As new ransomware variants appear on a regular basis, it is essential now more than ever for CISOs to always keep their security software and other apps up-to-date.
Tarun Kaura, Director, Product Management at Symantec APJ, highlights the most critical industry compliance issues faced by IT security heads and how they can mitigate them.
Learn why the Necrus botnet is currently considered the world's largest spam botnet.
Learn how fraudsters are using popular games like Clash of titalns to carry out phising attacks on the player base.
Indian enterprises are waking up to a new era of cyberattacks as WannaCry spreads its wings.
A comprehensive guide on how to safeguard your organizations digital assets.
Highly Dangerous Mirai Botnets Have New Reaches
“Last year, we saw the board of directors being held responsible for cyber security oversight regularly,” says Julie Cullivan, EVP Business Operations and CIO of Fireeye.
Fileless malware seems to be rearing its head. So how do you protect your organization against attacks that have no files to scan?
A single click was all it took to launch one of the biggest data breaches ever
Trend Micro shows your enterprise how to defend against attacks, breaches and insider threats.
Learn how cybercriminals can turn unsecured home routers into bots and how you can defend your homes and businesses against attacks.
The industry is shifting from focusing on cybersecurity as a technology problem, to cybersecurity as a business problem. Organizations must change their strategy and plan for chaos, instead of anticipating its arrival.
Learn what Kaspersky lab has learned about ransomware after monitoring the developments of this ecosystem for the past few years.
KasperskyOS aims to protect software and data systems from the consequences of the intrusion of malicious code, viruses and hacker attacks.
Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server.
Machine learning in cybersecurity will enormously bolster spending in big data, intelligence and analytics, says ABI Research
Business Process Compromise (BPC) is a type of attack where hackers infiltrate an enterprise and look for vulnerable practices, susceptible systems, or operational loopholes.