Advanced Persistent Threats

Security investigator confronts Wipro on breach incident during investors’ call

Cybersecurity investigator Brian Krebs put Wipro in a tough spot by bringing up a critical data breach in the midst of a quarterly earnings call. Wipro called the incident a zero-day attack and has employed a forensic investigator to probe the incident.

Cyber espionage shows no signs of slowing down: Michael Sentonas, CrowdStrike

The bears, pandas, kittens and chollimas are out in the open, and the military top-brass is apprehensive. Michael Sentonas, VP of Technology Strategy at CrowdStrike, gives us a dekko at the cyber espionage threat landscape.

Former TransUnion CIBIL security leader Shiju Rawther joins India Infoline

The former head of IT infra and security operations at TransUnion CIBIL, Shiju Rawther has now joined financial services major, India Infoline as Executive VP-IT.

How H-Energy tackled emerging threats with an agile, scalable security solution

From safeguarding a massive mobile workforce to deploying an agile, scalable security solution, here’s how Vikas Gupta, CIO at H-Energy future-proofed cybersecurity at his organization.

Four white hat hackers who shot to fame in 2018

From exposing Aadhaar vulnerabilities to hunting down bugs in Microsoft. Here are four white hat hackers who made waves in the cybersecurity realm this year.

Symantec makes double acquisition to boost endpoint security

Symantec has enhanced its security portfolio through acquiring mobile application provider Appthority and advanced persistent threats specialist Javelin Networks.

Kaspersky Cyberinsights 2018: Cybersecurity in the age of digital transformation

The Kaspersky Cyberinsights 2018 two city series in India, as part of its pan-APAC series, put the spotlight on the central theme of “Building Cyber Defence and Resilience with Adaptive Security Framework”. 

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Software is the key enablement for defining security perimeter: Makarand Joshi, Citrix

Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.

Aditya Birla Group suffers cryptojack attack; 2000 computers used for mining Monero

First detected at an overseas subsidiary of the group a month ago, the malware spread to manufacturing and other services companies of Aditya Birla group. Monero was the currency mined.