Network Security

Security investigator confronts Wipro on breach incident during investors’ call

Cybersecurity investigator Brian Krebs put Wipro in a tough spot by bringing up a critical data breach in the midst of a quarterly earnings call. Wipro called the incident a zero-day attack and has employed a forensic investigator to probe the incident.

What is a honeypot? A trap for catching hackers in the act

A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.

Managing cybersecurity risks with threat intelligence: Kaspersky Lab

At CISO summit, Kaspersky labs explains why it’s important to have 360-degree view of tactics and tools to maintain immunity towards unseen cyber-attacks. 

A tenth of security alerts that should be taken seriously are ignored: John Maynard, Cisco

From evolving threats to DNS attacks and IoT security, John Maynard, Global Security Officer at Cisco brings to light present-day security challenges the enterprise needs to brace up to.

Former Paytm security leader Aditya Khullar joins OYO Rooms as Head-Cybersecurity

After a stellar stint in spearheading security at Paytm, Aditya Khullar joins OYO Rooms as its head of cybersecurity.

New CISA director outlines top 5 priorities for protecting U.S. critical infrastructure

CISA’s Christopher Krebs has a two-year plan for his new cybersecurity agency, with China, supply chain and 5G as top priorities.

What is shadow IoT? How to mitigate the risk

When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk.

Seven security and risk management trends for 2019: Gartner

Gartner defines top trends as ongoing strategic shifts in the security ecosystem are expected to have broad industry impact and significant potential for disruption.

Seqrite rolls out enterprise mobility management to secure BYOD workplaces

Seqrite EMM enables IT teams to remotely schedule a security scan on enrolled devices to identify risks and infections with  anti-malware capabilities. 

IoT botnets target enterprise video conferencing systems

WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk.

Check Point launches new hyperscale network security solution

Check Point Maestro is a revolutionary new architecture that enables businesses of any size to enjoy the power of flexible cloud-level security platforms.