Intrusion

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Partner Content
How to Secure Your Sensitive Data in the Cloud

While most Cloud Service Providers (CSPs) have already deployed strong front line defense systems like firewalls, anti-virus, anti-malware, intrusion detection, etc. to thwart malicious attacks, sophisticated hackers are breaching them with surprising ease today.

Partner Content
Data Encryption: From “Good-to-Have” To “Must-Have”

As per the H1 results of Gemalto’s 2018 Breach Level Index, more than 3.3 billion data files were breached across the globe in the first six months of 2018 alone. This figure marks an increase of a whopping 72% over those recorded for H1 2017!

Kaspersky Cyberinsights 2018: Cybersecurity in the age of digital transformation

The Kaspersky Cyberinsights 2018 two city series in India, as part of its pan-APAC series, put the spotlight on the central theme of “Building Cyber Defence and Resilience with Adaptive Security Framework”. 

DigitalTrack acquires Encrust to become national SI

Muneer Ahamed will lead the merged entity, and Encrust’s co-founders Shahjahan and Vijay will be directors for DigitalTrack Solutions West. 

How smart hospitals are dealing with cybersecurity

The healthcare industry is using technology to digitilise the sector and make 'smart hospitals'. But how is it confronting the threat of cyber risks? Here we examine how smart hospitals are working and cybersecurity in healthcare.

Why I don’t believe Bloomberg’s Chinese spy chip report

China can and has stolen the information it wants from US companies without using secretly embedded hardware, so why would it jeopardize its massive semiconductor industry?

Partner Content
Digital Signatures: Making e-Procurements Safer

As technology evolves, so do hackers. Armed with a deviously brilliant mind and superior knowledge of the latest technologies, today’s hackers are breaching organisations’ cybersecurity with surprising ease. 

Trend Micro helps Capillary Technologies secure multi-cloud environments

Trend Micro Deep Security helped secure their workloads on Amazon Web Services (AWS) and Microsoft Azure public cloud environments.

“Everything is fine” vs. “we’re doomed” isn’t the way to frame election security

The extremes of despair and optimism are both dangerous to information security. What we need to do is calmly assess the threats.

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.

Partner Content
4 Ways to Breach-proof Your Bank’s ATMs

‘ATM Cash-out’ is a meticulously planned, highly choreographed, global cyber attack wherein hackers breach a bank or payment card processor’s cybersecurity systems and use cloned debit cards at multiple ATM machines around the world to fraudulently withdraw millions of dollars within a short period of time.