Spam

Sophos launches advanced email protection solution

SophosLabs research discovered that 75 percent of malware in an organization is unique to that organization which indicates the majority of attacks are zero-day

S K Rudra

At C K Birla Hospitals, S K Rudra and his team implemented centralized monitored and managed Urchin Tracking Module (UTM), as the only route for all the outgoing and incoming traffic. It established gateway IPS, anti-virus, anti-spyware, anti-spam, application filter and web filter in place. It further, enforced identity and MAC-based access control policies. 

Sanjay Gurav

At Batlivala and Karani Securities, Sanjay Gurav implemented synchronized security to have the best defenses to coordinated attacks which keep changing rapidly.

Sandeep Jamdagni

At Ashiana Housing, Sandeep Jamdagni, built a complete security system and policy to ensure users are aware of threats and the systems and networks are secure.

Amit Sharma

At Apollo Munich Health Insurance, Amit Sharma, implemented a Security Incident and Event Management (SIEM) system that could give real time threat alerts. 

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

Partner Content
How hackers use spam to maximize the impact of a cyber attack?

‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services.

Partner Content
Malware in attachment? Stop them before they hit your organization's security

Malware authors are continuously experimenting and employing new tactics to disguise their malware into email attachment. The key objective is to make the email look “normal” and “non-suspicious”, which will prompt the recipient to open the attachment without any suspicion.

Partner Content
Spotted unusual activity on network: Here's what to do next

Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an enterprise network.

Police cracks the whip on world's largest DDoS marketplace

A joint operation by law enforcement agencies around the world has shut down webstresser.org, which launched 4 million DDoS attacks and targeted banks, governments and enterprises. 

10 tips to minimize IoT security vulnerabilities

Online Trust Alliance spells out best practices for testing, purchasing, networking and updating IoT devices to make them and the enterprise more secure.

The clearer the CSO role, the easier to get budget approved: Mushtaq Ahmed, CSS Corp

For an organization to be secure from any cyber threats, investments should be made in technology, people, and policy, says Mushtaq Ahmed of CSS Corp.