Top 15 guidelines to be implemented against Ransomware Abhishek Raval May 16, 2017 The Wannacry ransomware has brought the enterprise, government agencies to their toes and everybody has swung into action to…
Biometrics for data security Ankush Kumar May 15, 2017 Biometrics for data security has been adopted by the consumer market followed by government, healthcare, finance, NGOs, law…
Ensuring Information Security in Indian Hospitals Srikanth RP May 15, 2017 In the backdrop of the 12th May 2017 Wanna Cry ransomware virus attack which impacted an estimated 150,000 systems in over 100…
Trend Micro researchers discover new IoT botnet that targets IP cameras Srikanth RP May 11, 2017 A new Internet of Things (IoT) botnet called Persirai has been detected by Trend Micro researchers. The botnet has been discovered…
Crafting nationwide protection strategy for cyber security: Check Point Ankush Kumar May 10, 2017 Our plan from the nationwide strategy is to focus on the critical infrastructure and provide nationwide protection. Like banks,…
Qualys helps financial institutions comply with RBI’s cyber security guidelines Abhishek Raval May 9, 2017 Qualys Security Platform out-of-the-box capabilities automate assessment and reporting requirements for RBI compliance
In cybersecurity, no solution is a long term solution Rachana May 3, 2017 Cybersecurity has always been a moving goalpost. Hence, enterprise security needs to be adaptive and dynamic, states Ratan Jyoti,…
Cyber police station inaugurated in Nashik Mohd Ujaley May 1, 2017 Maharashtra water resources minister Girish Mahajan today inaugurated a cyber police station here.
Walking the e-governance tightrope: balancing growth and security Ankush Kumar Apr 27, 2017 The pace of adoption and success of e-governance initiatives will eventually rely on how the government walks the tight rope -…
Impact and challenges of increasing cyber security issues Ankush Kumar Apr 25, 2017 The overall global impact of hackers striking targets using anonymous infrastructure and stealthily intercept emails, VOIP calls…