Spam

Seqrite launches Seqrite Secure Web Gateway for enterprises

Built on a powerful machine learning engine, Seqrite SWG offers protection against advanced Web threats 

Burning down the house: CEO attitudes to cyber security all wrong

Security In Depth has just published the results of research which found 83 per cent of Australian companies have no policies or plan in place for a data breach and 41 per cent said they “did not understand” what an ICT security framework was.

Microsoft, Tech Mahindra collaborate to build blockchain-based ecosystem to fight spam calls

Based on Blockchain technology and built on Microsoft Azure the solution aims at mitigating the issue of unsolicited commercial communication (UCC) in the country.  

Over one third of all phishing attacks target financial sector customers in Q2 2018

Attacks on customers of financial organizations, including banks, payment systems, and e- shop transactions, are an enduring trend in cybercrime and involve the theft of money as well as of personal data.

Seqrite detects more than 1.5 lakh incidents related to the Emotet Trojan

Reveals how the infamous Trojan has evolved into a complex malware capable of delivering multiple attack payloads such as Banking Trojans.

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

Sophos launches advanced email protection solution

SophosLabs research discovered that 75 percent of malware in an organization is unique to that organization which indicates the majority of attacks are zero-day

S K Rudra

At C K Birla Hospitals, S K Rudra and his team implemented centralized monitored and managed Urchin Tracking Module (UTM), as the only route for all the outgoing and incoming traffic. It established gateway IPS, anti-virus, anti-spyware, anti-spam, application filter and web filter in place. It further, enforced identity and MAC-based access control policies. 

Sanjay Gurav

At Batlivala and Karani Securities, Sanjay Gurav implemented synchronized security to have the best defenses to coordinated attacks which keep changing rapidly.

Sandeep Jamdagni

At Ashiana Housing, Sandeep Jamdagni, built a complete security system and policy to ensure users are aware of threats and the systems and networks are secure.

Amit Sharma

At Apollo Munich Health Insurance, Amit Sharma, implemented a Security Incident and Event Management (SIEM) system that could give real time threat alerts. 

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.