Cloud computing

Google, Hyperledger launch online identity management tools

The new tools enable mobile-based options for employees to sign into corporate applications or create self-sovereign identities, access to which they control.

Cyber espionage shows no signs of slowing down: Michael Sentonas, CrowdStrike

The bears, pandas, kittens and chollimas are out in the open, and the military top-brass is apprehensive. Michael Sentonas, VP of Technology Strategy at CrowdStrike, gives us a dekko at the cyber espionage threat landscape.

Google expands cloud security capabilities, including simpler configuration

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.

The 6 biggest ransomware attacks of the last 5 years

The biggest ransomware attacks illustrate how this particularly nasty genre of attack software has grown from a curiosity and an annoyance to a major crisis.

Go DACS this fiscal

CIOs and IT leaders of India Inc. focusing on data, artificial intelligence, cloud and security will be an upright start on day one of the new fiscal year.

The need of the hour is not just AI, but explainable AI: Subram Natarajan, CTO, IBM India/South Asia

From explainable AI to blockchain to building a super-fast processor, Subram Natarajan, CTO of IBM India/South Asia tells us how IBM does what it does best – innovate to stay ahead. 

Majority of Indian businesses struggle with adequate data protection: Research

Both in India and globally, 76 percent respondents experienced a disruption in the last 12 months, while 30 percent experienced irreparable data loss in India. 

A tenth of security alerts that should be taken seriously are ignored: John Maynard, Cisco

From evolving threats to DNS attacks and IoT security, John Maynard, Global Security Officer at Cisco brings to light present-day security challenges the enterprise needs to brace up to.

Cyber criminals increasingly favouring 'low and slow' stealth attacks

A "low and slow" approach to financially driven cyber attacks has overtaken ransomware as the chief attack vector for criminals seeking to extort money by stealth using crypto mining-based malware, according to research by British cybersecurity upstart Darktrace.

Former Paytm security leader Aditya Khullar joins OYO Rooms as Head-Cybersecurity

After a stellar stint in spearheading security at Paytm, Aditya Khullar joins OYO Rooms as its head of cybersecurity.

Hackers use Slack to hide malware communications

A watering hole attack used Slack for its command-and-control communications to avoid network and endpoint detection.

VMware firewall takes aim at defending apps in data center, cloud

VMware says its new Service-defined Firewall has gains deep visibility into the hosts and services that generate network traffic via company’s existing NSX network management software, its vSphere hypervisors and AppDefense threat detection system.