Online security

Partner Content
Email-borne cyber attacks: A constant security threat

The sheer widespread usage of e-mails, both on a personal and on a professional basis by sheer billions of people, means hackers and cyber criminals can target multiple people at once.

Partner Content
Companies Collect More Data Than They Can Analyse

With GDPR on most organisations’ minds, now is the perfect time to look at just how confident organizations are in protecting the data they collect. 

The chase between cyber-crime and cyber-security: What are startups doing about it?

The sensitivity towards cyber-crime is increasing. VCs are backing those startups that arrived early in the cyber-security space. In India, this industry vertical is still nascent, with around 50 security product startups.

Bitdefender unveils new 2019 product line

Bitdefender launches its 2019 consumer security product line, which aims to stop criminals before they attack.

10 questions to ask when considering a cloud services provider's encryption solutions

Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

Partner Content
Fabtech India ensures endpoint protection and secure network access with Seqrite EPS

"We have considered Seqrite EPS after a deep scrutiny. It offers a range of attractive features including secured IT policies with easy usability and manageability. Seqrite EPS clearly met our expectations in numerous categories."

Partner Content
Threats posed by portable storage devices

Organizations where portable devices are used or allowed often ignore the threats posed by such devices. This white paper will examine the nature of threats that organizations may have to face due to portable devices and as a counterpart to these threats how organizations can eliminate them.

Partner Content
How to identify, prevent and recover from cryptojacking attacks

Cryptojacking is a sneaky but extremely effective way for hackers to get their desired results in exactly the surreptitious, stealthy way they desire.

Privileged access is a critical pathway to all attacks: Jeffrey Kok, CyberArk

By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.

Sophisticated attacks go undetected with traditional security solutions: CrowdStrike

Speaking at IDG Security Day & CSO 100 Awards 2018, Ramanand Kambli and Satbir Singh from CrowdStrike highlighted how attacks are getting sophisticated, and how enterprises can address all security challenges with their cloud-based offering. 

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.