The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.
With the cyber security industrial complex in full swing and good business for all the major players, from governments and state sponsored groups, to criminal attackers and the vendors as well as their shareholders, we wonder what horrors this dystopian hell world will spew forth next.
To better defend against sophisticated cyber threats seen in recent years and provide identity-based access to applications, DTDC Express decided to upgrade its existing firewall implementation.
Symantec Industrial Control System Protection Neural to defend against USB-borne malware, network intrusion and zero-day attacks on OT.
While most Cloud Service Providers (CSPs) have already deployed strong front line defense systems like firewalls, anti-virus, anti-malware, intrusion detection, etc. to thwart malicious attacks, sophisticated hackers are breaching them with surprising ease today.
As per the H1 results of Gemalto’s 2018 Breach Level Index, more than 3.3 billion data files were breached across the globe in the first six months of 2018 alone. This figure marks an increase of a whopping 72% over those recorded for H1 2017!
The Kaspersky Cyberinsights 2018 two city series in India, as part of its pan-APAC series, put the spotlight on the central theme of “Building Cyber Defence and Resilience with Adaptive Security Framework”.
The healthcare industry is using technology to digitilise the sector and make 'smart hospitals'. But how is it confronting the threat of cyber risks? Here we examine how smart hospitals are working and cybersecurity in healthcare.
China can and has stolen the information it wants from US companies without using secretly embedded hardware, so why would it jeopardize its massive semiconductor industry?