Mobile security

Toyota reports yet another data breach; 3.1 million customer accounts exposed

Japanese automaker, Toyota, announced on Saturday that a data breach resulted in the data of 3.1 million customers being compromised. This is in fact the second data breach the company faced in the last five weeks. 

Former TransUnion CIBIL security leader Shiju Rawther joins India Infoline

The former head of IT infra and security operations at TransUnion CIBIL, Shiju Rawther has now joined financial services major, India Infoline as Executive VP-IT.

One in three organizations suffered data breaches due to mobile devices

New Verizon report shows a big gap between organizations' mobile security risk concerns and mobile security best practices they implement.

Authentication, encryption and AI – the key components in securing connected cars

The single biggest threat to widespread proliferation of connected cars is data security. A conversation with two giants in the Indian auto space – Tata Elxsi and Tata Technologies brings to light why the threat is of paramount importance and what can be done to bolster security.

WannaCry is still alive hitting almost 75,000 users in Q3 2018

The percentage has risen over the last year, demonstrating more than two thirds growth against Q3 2017, when its share in cryptor attacks was 16.78 percent.

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.

Kaspersky Cyberinsights 2018: Cybersecurity in the age of digital transformation

The Kaspersky Cyberinsights 2018 two city series in India, as part of its pan-APAC series, put the spotlight on the central theme of “Building Cyber Defence and Resilience with Adaptive Security Framework”. 

Quantum communication will make internet unhackable: Research

Purdue University research on quantum communication, supported by the U.S. Department of Energy can soon make internet communication hacking a thing of the past. 

Partner Content
Digital Signatures: Making e-Procurements Safer

As technology evolves, so do hackers. Armed with a deviously brilliant mind and superior knowledge of the latest technologies, today’s hackers are breaching organisations’ cybersecurity with surprising ease. 

Partner Content
What is EMM? Enterprise Mobility Management explained

EMM hence refers to solutions, products and services that ensure the security of data and integrate with enterprise IT systems to meet corporate concerns.

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.