Intrusion

Top 10 priorities that will help Indian companies to embrace GDPR

On 25 May 2018, the EU General Data Protection Regulation (GDPR) comes into effect, giving regulators unprecedented power to impose fines, and requiring large-scale privacy changes across organizations if they conduct business in Europe.

Symantec targeted attack analytics helps uncover the most sophisticated cyber attacks

AI and machine learning innovations automate capabilities of Symantec’s world-class investigations team to zero-in on the most pressing threats.

SonicWall launches Capture Cloud platform to expand cybersecurity portfolio

SonicWall also is introducing new and enhanced products in its portfolio of hardware, virtual appliances and endpoint clients.

Netmagic, McAfee partner to offer malware protection services

The services will offer next generation server security to customers via Netmagic’s cloud services on pay per use basis.

Insecure by design: What you need to know about defending critical infrastructure

Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.

2017 Equifax breach could well be the most expensive hack ever

The 2017 Equifax breach is worse than we thought –the company reveals that 2.4 million more accounts were affected.

Aadhaar hack encore: Basic SQL injection exposes 96 lakh accounts

A security researcher brings to light the absolute ease with which Aadhaar data can be accessed.

How MSSPs can address the cybersecurity talent gap

Managed security services providers can help companies struggling to fill security roles.

What makes the digital payments space in India an unguarded minefield

In wake of the National Cyber Security Coordinator’s startling revelation of 1.5 lakh online transactions being compromised every day, digital payment companies in India are walking on thin ice when it comes to protecting user data.

What is an intrusion detection system (IDS)? A valued capability with serious management challenges

An IDS monitors network traffic, searching for suspicious activity and known threats and sending up alerts when it finds such items. The function remains critical in the modern enterprise, but maybe not as a standalone solution.

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed?