Patches

Victims of malicious crypto miners increases by 44 percent: Study

Statistics for the last 24 months show that miners are increasingly focused on developing markets and are taking advantage of internet users in these regions to grow their revenues.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Best computer security tips

Computers are such an integral part of life now, that it can be easy to take them for granted. But, with so much of our personal, financial, and legal information accessible through your PC, laptop and phone, it’s essential that we keep them and Windows 10 secure.

Satish K Sharma

Satish K Sharma led a team of experts to carry out a detailed gap analysis against ISO-27001:2013 guidelines to attain high security levels. 
 

Shailendra Upadhyay

Shailendra Upadhyay has been in-charge of the implementation of SaaS (security-as-a-service) to identify any incident reported on the internet at any given point of time. He also helped deploy a centralized patch management solution that assists in managing all OS patches automatically. 

Meetali Sharma

Meetali Sharma conducted an internal risk assessment with respect to the security standards, identified gaps, and made numerous changes within the environment. This included physical segregation, VLAN segmentation, dual factor authentication, policy alignment, and employee trainings. 

Rajesh Shetty

At Aditya Birla Sun Life Insurance, Rajesh Shetty set up a deep security virtual patching for servers and an ENS, active response and threat intelligence, for advanced protection of its servers and end points.

Partner Content
The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Most big surveys reckon that human errors are at the heart of security incidents.

Partner Content
How to protect your server against ransomware attacks?

Many companies get scared and pay up the demanded ransom almost immediately which only leads to criminals getting more emboldened. 

Intel discloses new vulnerability that could affect Core family CPUs

With Meltdown and Spectre variants still on the map, another security vulnerability has emerged that affects Intel processors’ speculative execution technology.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Partner Content
Malware in attachment? Stop them before they hit your organization's security

Malware authors are continuously experimenting and employing new tactics to disguise their malware into email attachment. The key objective is to make the email look “normal” and “non-suspicious”, which will prompt the recipient to open the attachment without any suspicion.