A strong upward trend in malware developers using steganography for different purposes is seen, including for concealing C&C communication and for downloading malicious modules
Money remains the driving force of DDoS attacks.The growing interest in cryptocurrencies leads to an increase in their exchange-value in the second quarter of 2017.
How to gain visibility and control of data in cloud apps.
From data leaks to the open source platform the network is being hosted on, experts have raised concerns from time to time about GST-related security issues. Here's a brief insight into a few of them.
While newer technologies offer better opportunities to respond to information security threats, enterprises need to ensure right checks and balances.
Know more about Microsoft Cloud App Security—a comprehensive cloud-delivered service providing deeper visibility, comprehensive controls, and improved security for cloud applications.
Watch to know how to gain deeper visibility, stronger controls and enhance security for your cloud applications with Microsoft Cloud App Security.
The complexity of coordinating multiple point solutions, combined with the leaner budgets and shrinking bandwidth of IT, can make it challenging to evaluate how your mobility strategy stacks up to current market options.
"How many of my Android devices can support device encryption?” - Brad Anderson explains how to deal with this challenge.
In a world that emphasizes connectivity, mobility, sharing and cloud services, business information flows continuously in and out of endpoint devices. Security and risk management leaders must develop a portfolio of solutions to address different aspects of encryption and boundary defense.
Microsoft’s amazing placement validates vision of providing a complete identity and access management solution for employees, partners, and customers, all backed by world-class identity protection based on Microsoft’s Intelligent Security Graph.
Adding more layers of defenses only adds to the complexity of the problem. It’s far more effective to mature the organization’s IT security processes and make it a strategic enabler of growth.
Siva Sivasubramanian of Bharti Airtel shared his insights into what makes the telecom sector a prime target for cyber criminals, and what the industry can do to fight back.
Kunal Pande, partner – IT advisory of KPMG illustrates how risks in the new age of robotics and AI need to be mitigated by enterprises.
In IDG's first edition of Security Day, we bring to you the stalwarts of the industry to join in a much needed global conversation on enterprise security.
CISOs are advised to have a basic security control of the organization, along with the upgrade of legacy system in critical areas, updated network infrastructure, and periodical security awareness to end users.
The distribution of rooting malware through Google Play is not a new thing. this Trojan not only installs its modules into the system, it also injects malicious code into the system runtime libraries.
Raspberry Pi - a new type of attack successfully allows an intruder to retrieve user authentication data – even when the targeted system is locked.
Ransomware attackers are motivated entirely by money, and they go after your high-value data.Here’s how one common type of Ransomware exploit happens, and what can be done to stop it.
Security experts say WannaCry demonstrates need for renewed focus on network security and computer configuration management.