Encryption

Cisco Talos details exceptionally dangerous DNS hijacking attack

Cisco Talos says state-sponsored attackers are battering DNS to gain access to sensitive networks and systems.

Google, Hyperledger launch online identity management tools

The new tools enable mobile-based options for employees to sign into corporate applications or create self-sovereign identities, access to which they control.

The 6 biggest ransomware attacks of the last 5 years

The biggest ransomware attacks illustrate how this particularly nasty genre of attack software has grown from a curiosity and an annoyance to a major crisis.

Data protection: The role of AI, analytics and the new CDO

As data protection takes center stage in the enterprise, companies will require a chief data protection officer (CDpO) instead of a chief digital officer (CDO).

Go DACS this fiscal

CIOs and IT leaders of India Inc. focusing on data, artificial intelligence, cloud and security will be an upright start on day one of the new fiscal year.

Can blockchain be the antidote to ransomware?

The technological know-how (of blockchain) that ransomware hackers exploit could also help fight against such attacks.   

Quantum computing will break your encryption in a few years

Quantum technology is set to make public-key infrastructure obsolete before too long, but it might also keep your data secure.

Partner Content
Understanding Key Management Policy – Part 1

While front line defense mechanisms like firewalls, anti-theft, anti-spyware, etc. definitely act as a strong deterrent against cyber attacks, they are rendered useless when a hacker gains inside entry by exploiting their vulnerabilities to bypass them.

WebAuthn: What you need to know about the future of the passwordless Web

Hate passwords? We all do. So Microsoft, Google, and other browser makers have made WebAuthn to replace passwords with your fingerprint and facial recognition.

400 percent increase in phishing attacks in 2018 : Report

During the study period, Zscaler blocked 1.7 billion threats hidden in SSL traffic, which translates to an average of 283 million advanced threats blocked per month.

Password managers remain an important security tool despite new vulnerability report

Experts downplay discovery of a vulnerability that can expose passwords in a computer's memory. Hackers likely to take easier paths to stealing passwords.

Seqrite rolls out enterprise mobility management to secure BYOD workplaces

Seqrite EMM enables IT teams to remotely schedule a security scan on enrolled devices to identify risks and infections with  anti-malware capabilities.