The biggest software company in the world, Microsoft has had a rough month with significant spikes in targeted malware attacks and an out-of-the-blue Office 365 outage that threw enterprises out of gear all over the globe.
Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.
Cloud App Security managed to detect over 50,000 ransomware and 3,000 BEC threats in the last three quarters of 2017.
There’s no denying that fortifying defenses is the first step to cyber-resiliency. What takes a back seat though, is the lack of proper incident response plans. IBM-Ponemon’s 2018 cyber-resiliency study reveals 77 percent of firms lack proper incident response plans.
RBI has set April 30th as the deadline for banks to link their CBS with SWIFT. Here are five cases of SWIFT misuse that led to a cybersecurity nightmare, which could have been avoided.
A security researcher brings to light the absolute ease with which Aadhaar data can be accessed.
Managed security services providers can help companies struggling to fill security roles.
This whitepaper promises to peel the veil back and take a no-holds-barred, brutally honest view at security risks for your enterprise.
While Microsoft's Windows Defender frowned upon "optimizer" or "cleaner" apps that didn't explain what they did, it's drawing the line on "scareware" apps that tell you that your PC will be ruined if you don't pay up.
The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018
Given the new age threat landscape, CIOs and CSOs across the board can no longer bank upon a fortified periphery that would protect the organization’s crown jewels.
Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.