Spam

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

Proactive protection is the best shield for CISOs: Nilesh Jain, Trend Micro

"We are primarily focused to deliver proactive protection to customers across server security, endpoint security and network security", says Nilesh Jain, Vice President – South East Asia and India, at Trend Micro India. 

App-first stage of tech evolution is here: Parag Khurana, F5 Networks

"In 2018, we would see a lot more deliberate actions by companies to augment security of their applications," says Parag Khurana, Managing Director, India and SAARC at F5 Networks.

Three API security essentials for enterprises

With enterprises heavily depending on APIs for growth, API security has emerged as a business-critical component today. Tips to employ an effective API security framework.

Partner Content
Using legitimate tools to hide malicious code

The authors of malware use various techniques to circumvent defensive mechanisms and conceal harmful activity.

Partner Content
Machine Learning: How to Build a Better Threat Detection Model

In this article, Sophos describes the process they used  to develop their models. To help explain the concepts, they worked through the development and evaluation of a toy model meant to solve the very real problem of detecting malicious URLs.

Partner Content
Machine Learning for Cybersecurity, Demystified by Sophos

To date, our industry has mystified machine learning in secrecy and jargon. Transparency, explanation, and information is what is prefered. Please enjoy this guide – a collection of the articles we’ve shared throughout the year to tell the story.

Partner Content
Spam and phishing in Q3 2017

Cryptocurrencies have been a regular theme in the media for several years now.

Partner Content
How SSL certificate prevents phishing on your website?

Phishing is one of the security challenges that businesses, as well as individuals, face keeping their valuable information safe.  

Partner Content
Miners on the Rise

Over the last month alone, we have detected several large botnets designed to profit from concealed crypto mining. We have also observed growing numbers of attempts to install miners on servers owned by organizations. When these attempts are successful, the companies’ business processes suffer because data processing speeds fall substantially.  

Partner Content
Spam and phishing in Q2 2017

In Q2 2017, the average share of spam in global email traffic amounted to 56.97%, which was only 1.07 p.p. more than in the previous quarter. One of the most notable events of this quarter – the WannaCry epidemic – did not go unnoticed by spammers: numerous mass mailings contained offers of assistance in combating the ransomware.  

Partner Content
The return of Mamba ransomware

At the end of 2016, there was a major attack against San Francisco’s Municipal Transportation Agency. The attack was done using Mamba ransomware.