In the part 2 of the GDPR article, Dan Plastina, will dive deeper into the data lifecycle and how Azure Information Protection can help you provide persistent data protection both on-premises and in the cloud.
With over 90 percent Indian businesses revealing that they are at risk of being breached, how should enterprises look at security this year?
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.
The distribution of rooting malware through Google Play is not a new thing. this Trojan not only installs its modules into the system, it also injects malicious code into the system runtime libraries.
Raspberry Pi - a new type of attack successfully allows an intruder to retrieve user authentication data – even when the targeted system is locked.
Ransomware attackers are motivated entirely by money, and they go after your high-value data.Here’s how one common type of Ransomware exploit happens, and what can be done to stop it.
Security experts say WannaCry demonstrates need for renewed focus on network security and computer configuration management.
The technologies to prevent credential theft and abuse, complement the protections used to stop other types of threats, and they bring together new preventative capabilities.
Learn how effective machine learning can help prevent malware and protect your endpoints.
With increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, devices and networks – all hosting sensitive data.
A fine local gathering with talks on advanced social engineering, APT herding, securing smart cities and more, with quality content.
Large Scale network promotes applications infected with the Ztorg Trojan through advertising campaigns. Infected viruses are gaining thousands of new users each day!
A WannaCry cryptor sample from February 2017 looked like a very early variant. More research is required into older versions of Wannacry.
“WannaCry” is initiated through an SMBv2 remote code execution in Microsoft Windows. It can be blocked by installing patch provided by Microsoft.
A consumer would need every possible argument to ensure that his security when performing a transaction is guaranteed hence he has to be cautious when deciding on the SSL certificate provider.
Cyber-criminals are finding better approaches to adventure shortcomings and attempting to grow perpetually complex techniques for assault–or discovering innovative rehashes of old traps.
The new General Data Protection Regulation (GDPR) is the most significant change to European Union (EU) privacy law in two decades.