Cybersecurity investigator Brian Krebs put Wipro in a tough spot by bringing up a critical data breach in the midst of a quarterly earnings call. Wipro called the incident a zero-day attack and has employed a forensic investigator to probe the incident.
A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.
At CISO summit, Kaspersky labs explains why it’s important to have 360-degree view of tactics and tools to maintain immunity towards unseen cyber-attacks.
From evolving threats to DNS attacks and IoT security, John Maynard, Global Security Officer at Cisco brings to light present-day security challenges the enterprise needs to brace up to.
CISA’s Christopher Krebs has a two-year plan for his new cybersecurity agency, with China, supply chain and 5G as top priorities.
When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk.
Gartner defines top trends as ongoing strategic shifts in the security ecosystem are expected to have broad industry impact and significant potential for disruption.
Seqrite EMM enables IT teams to remotely schedule a security scan on enrolled devices to identify risks and infections with anti-malware capabilities.
WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk.
Check Point Maestro is a revolutionary new architecture that enables businesses of any size to enjoy the power of flexible cloud-level security platforms.