Spam

10 tips to minimize IoT security vulnerabilities

Online Trust Alliance spells out best practices for testing, purchasing, networking and updating IoT devices to make them and the enterprise more secure.

The clearer the CSO role, the easier to get budget approved: Mushtaq Ahmed, CSS Corp

For an organization to be secure from any cyber threats, investments should be made in technology, people, and policy, says Mushtaq Ahmed of CSS Corp.

Trend Micro detects and blocks 3.4mn high-risk email threats in 2017

Cloud App Security managed to detect over 50,000 ransomware and 3,000 BEC threats in the last three quarters of 2017.

8 security tools and tips for journalists

Journalists have a giant red target on their backs. How can we defend ourselves?

Healthcare attacks, fileless malware, cryptocurrency mining on a rise: Report

The McAfee reports shows that healthcare experiences 211 percent increase in disclosed security incidents in 2017.

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.

Partner Content
Fortinet threat landscape report reveals attacks per firm increased by 82 percent

Swarm Cyberattacks Target the Internet of Things (IoT) with Growing Intensity.

Partner Content
The big security threats your organization needs to take seriously now

This whitepaper promises to peel the veil back and take a no-holds-barred, brutally honest view at security risks for your enterprise. 

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

Proactive protection is the best shield for CISOs: Nilesh Jain, Trend Micro

"We are primarily focused to deliver proactive protection to customers across server security, endpoint security and network security", says Nilesh Jain, Vice President – South East Asia and India, at Trend Micro India. 

App-first stage of tech evolution is here: Parag Khurana, F5 Networks

"In 2018, we would see a lot more deliberate actions by companies to augment security of their applications," says Parag Khurana, Managing Director, India and SAARC at F5 Networks.

Three API security essentials for enterprises

With enterprises heavily depending on APIs for growth, API security has emerged as a business-critical component today. Tips to employ an effective API security framework.