Online security

Partner Content
Anatomy of a Data Breach: How to adopt a proactive approach

With a phenomenal shift towards digitization, the vulnerability towards cyber breach is on the rise for almost all companies.

Partner Content
KIMS Group of Hospitals safeguards their data with Seqrite EPS

Seqrite EPS is a cost-effective and an efficient endpoint security solution. 

Partner Content
The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Most big surveys reckon that human errors are at the heart of security incidents.

Partner Content
How cybersecurity laws play an important role in securing your organization

Over the last few years, the key buzzword has been cybersecurity, thanks to the number of breaches and vulnerabilities that have occurred.

Partner Content
How hackers use spam to maximize the impact of a cyber attack?

‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services.

Partner Content
5 Critical corporate cybersecurity risks for SMBs

If you are the owner of a SMB, you cannot underestimate the importance of having a strong cybersecurity defence.

5 major cyberattacks and hacks of 2017

As we approach IDG Security Day on June 21, here is a glance at the major hacks, threats and ransomware attacks that shook the industry last year.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Software is the key enablement for defining security perimeter: Makarand Joshi, Citrix

Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.

Partner Content
Machine Learning in Digital Security

Machine Learning is a field of computer science that gives computers the ability to learn from the past/seen data and apply it to the unseen data.

Partner Content
5 Cybersecurity Myths for Linux Users

Unfortunately, cyber security is no joking matter nowadays – the consequences of a weak system could be devastating for any company.

Partner Content
Wake up call: Right time to secure your online data

According to investigations made by the American and the British media, Cambrige Analytica stole personal information from 50 million Facebook user profiles.