Ransomware continues to be the most profitable malware type: Cisco 2016 Midyear Cybersecurity Report Mohd Ujaley Jul 27, 2016 Fragile infrastructure, poor network hygiene, and slow detection rates are providing ample time and cover for hackers to operate
74% of APJ organizations face significant risk of cyber incidents: RSA Mohd Ujaley Jul 20, 2016 RSA, the security division of EMC, has announced the results of research that demonstrates organizations in Asia Pacific &…
Niantic’s Pokémon Go privacy concerns are overblown: F-Secure Mohd Ujaley Jul 14, 2016 Refuting the entire controversy and security concerns surrounding Niantic's Pokémon Go that it may be compromising the gamer Gmail…
Forcepoint bets big on platform vision Srikanth RP Jun 30, 2016 In the midst of a major transformation and branding exercise under a new company name, Forcepoint (earlier known as Raytheon|…
Cyber Security Strategy – An Important Element of Banks’ Overall Digital Strategy Jasmine Desai Jun 21, 2016 As this article gets written, news of the Russian hack attack on Google, Microsoft and Yahoo email accounts, whose information was…
Cisco to offer $10 mn scholarship for cybersecurity Mohd Ujaley Jun 15, 2016 The fund will be spent on training, mentoring and certification with the aim to increase pool of talent with critical…
8% of users hide their computers to keep their sensitive data safe: Kaspersky Lab Mohd Ujaley Jun 10, 2016 To protect their privacy, paranoid users are turning to a multitude of methods to keep their personal data away from prying eyes…
Reserve Bank asks lenders to implement cyber security policy Express News Service Jun 3, 2016 Depending on the level of inherent risks, the banks are required to identify their riskiness as low, moderate, high and very high…
Cyber Security is becoming a Boardroom Agenda Ankush Kumar Jun 1, 2016 With increased cyber attacks and newer incidents being reported regularly, C-level executives and board members are increasingly…
Express Computer June, 2016 Rashi Varshney May 28, 2016 In an age of connected machines, this issue highlights how CIOs and CISOs are creating an unbreakable security infrastructure