Vulnerabilities

Pune-based Cosmos Bank loses Rs 94 crore to hackers

A malware attack helped hackers clone thousands of debit cards and siphon off over ₹94 crore from Cosmos Bank over a period of two days.

How CIOs should respond to a data breach

How prepared is your organisation to deal with the fallout from a cyber attack?

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

Partner Content
Email-borne cyber attacks: A constant security threat

The sheer widespread usage of e-mails, both on a personal and on a professional basis by sheer billions of people, means hackers and cyber criminals can target multiple people at once.

Partner Content
POS security vulnerabilities for retail industry

One of the most publicized POS breaches happened with American retailer, Target in 2013 where 41 million customer payment card accounts and contact information for more than 60 million Target customers were affected.

By 2020, 1-in-5 healthcare orgs will adopt blockchain; here’s why

Blockchain lets the healthcare industry exchange data in a standard format, automate complex processes and apply AI against large silos of medical data. It might even allow patients to sell their data for rewards.

Partner Content
3 Common Problems in Vulnerability Management

Vulnerability management is a key process in any information security program and regulatory compliance framework. Why is it that many companies lag behind on patches and updating their systems?

Partner Content
7 Pro Tips for Vulnerability Management

Managing vulnerabilities in an organization's network is often an overwhelming job that's never done. But with the help of automation and with proper prioritization, security teams can stay on top of the task.

Partner Content
[Report] Demystifying Vulnerability Management

All companies connected to the internet are vulnerable to cyber-attacks. And the potential losses are significant.  With increased scrutiny placed upon managing potential cyber security risks, it’s more important than ever to implement a robust vulnerability management program.

The chase between cyber-crime and cyber-security: What are startups doing about it?

The sensitivity towards cyber-crime is increasing. VCs are backing those startups that arrived early in the cyber-security space. In India, this industry vertical is still nascent, with around 50 security product startups.

Software security: There’s more to it than bug-bounty programs

Take full advantage of white-hat hackers to help you secure your code. And still do all the other security stuff you should do before you release your code