Mobile security

Partner Content
What is EMM? Enterprise Mobility Management explained

EMM hence refers to solutions, products and services that ensure the security of data and integrate with enterprise IT systems to meet corporate concerns.

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.

Widespread vulnerabilities in mobile point-of-sale readers

Security researchers uncovered widespread vulnerabilities in mobile point-of-sale readers offered by Square, SumUp, PayPal and iZettle.

The chase between cyber-crime and cyber-security: What are startups doing about it?

The sensitivity towards cyber-crime is increasing. VCs are backing those startups that arrived early in the cyber-security space. In India, this industry vertical is still nascent, with around 50 security product startups.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Amar H Shah

Ashok Leyland implemented a mobile security solution with the ability to implement geographic, device and user based security policies. 

Manish Sehgal

At AU Small Finance Bank, Manish Sehgal implemented a Mobile Security Solution with the ability to implement geographic, device and user-based security policies. 

Debojit Maitra

Debojit Maitra introduced all level protection Aditya Birla Fashion and Retail. He has implemented various security measures such as datacenter protection, servers and application protection, implemented Machine Learning and Deep Learning in perimeter and gateway level network, adequate measures in web & email security, BYOD device and end point protection and detection that would protect their digital systems from malicious Intruders of all sorts.
 

5 major cyberattacks and hacks of 2017

As we approach IDG Security Day on June 21, here is a glance at the major hacks, threats and ransomware attacks that shook the industry last year.

Software is the key enablement for defining security perimeter: Makarand Joshi, Citrix

Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.

Users attacked with malicious Office documents grew fourfold: Kaspersky

Attacks based on exploits are considered to be very powerful, as they do not require any additional interactions with the user and can deliver their dangerous code discreetly.