In October 2016, Kaspersky Lab products detected a surge in malware infection attempts on the computers of its customers who had industrial control systems installed. This was just part of the bigger story.
Enterprises are increasingly migrating to public or hybrid deployments, creating an immediate need to extend the level of security found in traditional networks to the newc cloud landscape. Read this document to understand Juniper Security for an Ever-Evolving Market
In today’s complex and constantly changing environment, network administrators need complete visibility into network behavior to maintain a robust security posture. Juniper Networks® Junos® Space Security Director provides correlated and actionable information on applications, users, and threats, allowing you to quickly neutralize risks and make smarter and faster security decisions.
With over 90 percent Indian businesses revealing that they are at risk of being breached, how should enterprises look at security this year?
In IDG's first edition of Security Day, we bring to you the stalwarts of the industry to join in a much needed global conversation on enterprise security.
Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.
You may not be able to plug up every hole, but there are ways to keep the dam from caving.
2017 saw a plethora of cyber attacks globally. Which ones affected India the most?
The distribution of rooting malware through Google Play is not a new thing. this Trojan not only installs its modules into the system, it also injects malicious code into the system runtime libraries.
Raspberry Pi - a new type of attack successfully allows an intruder to retrieve user authentication data – even when the targeted system is locked.
Ransomware attackers are motivated entirely by money, and they go after your high-value data.Here’s how one common type of Ransomware exploit happens, and what can be done to stop it.
Security experts say WannaCry demonstrates need for renewed focus on network security and computer configuration management.
The technologies to prevent credential theft and abuse, complement the protections used to stop other types of threats, and they bring together new preventative capabilities.
Learn how effective machine learning can help prevent malware and protect your endpoints.
With increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, devices and networks – all hosting sensitive data.
A fine local gathering with talks on advanced social engineering, APT herding, securing smart cities and more, with quality content.
The damage done by Dridex banking Trojan was estimated at over $40 million. The ongoing evolution of the malware shows that cybercriminals are not about to bid farewell to this.