The former head of IT infra and security operations at TransUnion CIBIL, Shiju Rawther has now joined financial services major, India Infoline as Executive VP-IT.
While front line defense mechanisms like firewalls, anti-theft, anti-spyware, etc. definitely act as a strong deterrent against cyber attacks, they are rendered useless when a hacker gains inside entry by exploiting their vulnerabilities to bypass them.
Before I unveil my two cents /pence of worldwide wisdom, let’s shed some light on the other victim of business travel – your devices’ digital journey.
Hate passwords? We all do. So Microsoft, Google, and other browser makers have made WebAuthn to replace passwords with your fingerprint and facial recognition.
New Verizon report shows a big gap between organizations' mobile security risk concerns and mobile security best practices they implement.
Experts downplay discovery of a vulnerability that can expose passwords in a computer's memory. Hackers likely to take easier paths to stealing passwords.
Seqrite EMM enables IT teams to remotely schedule a security scan on enrolled devices to identify risks and infections with anti-malware capabilities.
The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list.
Indian Oil denies leaking Aadhaar and personal data of an estimated 6,791,200 Indane users in face of irrefutable evidence.
We will cover 4 key technologies that play a pivotal role in protecting data — both at rest and in motion, and 3 important steps that organisations need to take to adhere to the bill’s mandates.
New report from Risk Based Security shows a downward trend in number breaches and exposed records, Unclear if privacy regulations like GDPR are having an effect.