Homepage

BSE & Network Intelligence have signed a Memorandum of Understanding (MoU) to offer cybersecurity services to its members with regards to the cybersecurity framework set by SEBI. The services...
Apr 22, 2019
329
0
It is no secret that ransomware and other cyberattacks are rising phenomenally across the world, attacking every industry sector possible and healthcare is one of the biggest targets. While the good...
Apr 18, 2019
813
0
Companies globally could incur USD 5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks, as dependency on complex internet-enabled business models outpaces...
Apr 17, 2019
677
0
Some of the employee accounts of Wipro—one of India’s top IT services firms—may have been hacked due to an advanced phishing campaign, reported Reuters, quoting the company. The company had launched...
Apr 16, 2019
461
0
The adoption of automation for IT security functions is on the rise across the US, UK and APAC, according to Poneman study. Overall, the findings demonstrate an increase in confidence in job security...
Apr 16, 2019
730
0
You have read about DNSpionage. The hackers behind DNSpionage succeeded in compromising key components of DNS infrastructure for more than 50 Middle Eastern companies and government agencies,...
Apr 15, 2019
500
0
Concerns about rapidly accelerating privacy regulations and their associated regulatory burdens became the top emerging risk that organizations face globally, according to Gartner’s latest Emerging...
Apr 15, 2019
2,681
0
Cryptominers are still the most prevalent malware aimed at organizations globally although crytomining services, such as Coinhive have closed down, according to Check Point Research’s Global Threat...
Apr 12, 2019
487
0
A vast majority of organizations surveyed are still unprepared to properly respond to cybersecurity incidents, with 77% of respondents indicating they do not have a cybersecurity incident response...
Apr 12, 2019
903
0
Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, today announced the release of the latest version of its flagship operating system, FortiOS 6.2, at its global...
Apr 10, 2019
906
0
As organizations are working with newer technologies and geographically distributed teams today, they are looking to hire more contractors and remote workers without any strict requirements for...
Apr 05, 2019
1,459
0
Vast volumes of data are being produced from various sources in our hyper connected world. Every second we are adding millions of gigabytes of data to the already overflowing data bank. Where is all...
Apr 04, 2019
1,358
0
Veeam, the leader in Backup solutions that enable Intelligent Data Management, today announced the new Veeam Backup for Microsoft Office 365 v3, offering organizations even faster backup, improved...
Apr 03, 2019
957
0
The majority of attacks in 2018 were aimed at direct financial profit or obtaining sensitive information, according to PT Security’s Cybersecurity Threatscape 2018 Report. However, attacks aimed at...
Apr 03, 2019
987
0
A cyberattack can cost a large manufacturing organization in Asia Pacific an average of USD 10.7 million in economic loss with customer churn being the largest economic consequence of a cyber breach...
Apr 03, 2019
1,243
0
Perhaps one of the most misunderstood terms in enterprise technology is ‘dark data’ and it’s something no CIO would want to keep in its server system. The term dark data originally coined by Gartner ...
Apr 02, 2019
1,283
0
A recent research by Barracuda’s study, titled Closing Backup and Recovery Gaps reveals new details about the attitudes and approaches SMBs have when it comes to backing up and recovering data, the...
Mar 29, 2019
1,022
0
There is an increasing growth rate of data of 130% in Indian organizations (vis-à-vis Globally: 569%) and an impressive jump in data protection “adopters” of nearly 50 percentage points (48%) since...
Mar 28, 2019
1,916
0
The number of vulnerabilities available to cybercriminals continues to accelerate. But according to one recent report, of the over 100,000 vulnerabilities published to the CVE list, less than 6% were...
Mar 19, 2019
1,455
0
Trend Micro, a global leader in cybersecurity solutions, announced that its Cloud App Security tool blocked nearly nine million high-risk email threats in 2018 as attackers continued to evolve their...
Mar 18, 2019
730
0
Micro Focus today announced the acquisition of Interset, a worldwide leader in security analytics software that provides highly intelligent and accurate cyber-threat protection. The addition of this...
Mar 15, 2019
654
0
Druva, the leader in cloud data protection and management, today announced enhancements to its Disaster Recovery-as-a-Service (DRaaS) offering for enterprise workloads. As the only SaaS-based...
Mar 13, 2019
937
0
Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, today announced that Rockman Industries Limited, a company that manufactures Aluminium die casting components,...
Mar 12, 2019
692
0
On March 6, 2019, the Federal Bureau of Investigation told Citrix that international cyber criminals gained access to its internal network. Resecurity, a security firm, has claimed that the attack...
Mar 11, 2019
1,102
0
Akamai, the intelligent edge platform for securing and delivering digital experiences, today announced enhancements designed to help businesses accelerate their cloud migration strategy. The new...
Mar 11, 2019
935
0
ManageEngine, the real-time IT management company, today announced that it has introduced user and entity behavior analytics (UEBA) into its SIEM solution, Log360. With score-based risk assessment,...
Mar 11, 2019
538
0
RSA, a global cybersecurity leader delivering Business-Driven Security solutions to help organizations manage digital risk, announced new enhancements to its award-winning Integrated Risk Management...
Mar 06, 2019
784
0
As IT strategies become more closely aligned with business goals, the ability for security and risk management (SRM) leaders to effectively present security matters to key business decision makers...
Mar 06, 2019
1,392
0
Cybercriminals are constantly evolving the sophistication of their attacks—from continuing to exploit the vast insecurity of IoT devices, to morphing open source malware tools into new threats,...
Mar 05, 2019
1,637
0
Threat Intelligence - It is the one word we all have heard various times recently. The subject has been under constant scrutiny for a while now, but do we understand it? Moreover, since it has been...
Feb 28, 2019
429
0
Dell EMC announced new and enhanced capabilities to the Dell EMC Data Domain and Integrated Data Protection Appliance (IDPA) portfolio of backup storage appliances designed to offer organizations...
Feb 21, 2019
932
0
Let us not look back in anger, or forward in fear, but around in AWARENESS! American cartoonist and author James Thurber’s quote, much before the era of computers and the internet, is a timeless...
Feb 19, 2019
200
0
The healthcare industry is increasingly leaning toward adopting hybrid clouds that combine private and public cloud services, and their respective benefits — with healthcare ranking third in the...
Feb 18, 2019
1,391
0
By 2022, 70% of organizations using biometric authentication for workforce access will implement it via smartphone apps, regardless of the endpoint device being used, according to Gartner. In 2018,...
Feb 07, 2019
1,541
0
Its 5:48 a.m. — only 48 minutes into your 12-hour shift in the security operations center (SOC), and you’ve already investigated three threats. You were prepared for a long shift, but since an...
Feb 06, 2019
1,511
0
Acronis, a global leader in cyber protection and hybrid cloud solutions, announced that it appointed SEA Infonet as a key distributor in India. SEA Infonet will be responsible for promoting and...
Feb 01, 2019
1,099
0
Trust is the cornerstone of every business and it is what businesses thrive on. Securing that trust is not an option but a business obligation—our very raison d’etra. However, it is getting...
Jan 31, 2019
366
0
There is significant rise in the volume of new vulnerabilities in 2018, according to Skybox Security’s Vulnerability and Threat Trends Report. The National Vulnerability Database (NVD) assigned 16,...
Jan 30, 2019
1,823
0
37% organizations have been affected by cryptominers globally, followed by mobile malware (33%), botnet malware (18%), banking malware (13%) and ransomware (4%), according to Checkpoint’s Cyber...
Jan 29, 2019
1,879
0
India finds its place amongst the leading nations globally in their preparedness towards the General Data Protection Regulation (GDPR), according to Cisco’s 2019 Data Privacy Benchmark Study....
Jan 28, 2019
2,047
0
2018 has been another transformative time for security teams in APAC regions. The imposition of new regulations like Australia’s Notifiable Data Breaches scheme and the Indian government’s push to be...
Jan 23, 2019
1,168
0
Two cyber security risks—data fraud/theft and cyberattacks—have been identified as the most likely risks for 2019 by the World Economic Forum (WEF), in its recently released annual Global Risk Report...
Jan 21, 2019
1,676
0
Securing enterprise networks is getting more complex with variety of devices accessing corporate networks and increasing viciousness of attacks by ransomware—compromising confidential customer data,...
Jan 21, 2019
316
0
Only around half (48%) of businesses can detect if any of their IoT devices suffers a breach, according to a Gemalto study. This comes despite companies having an increased focus on IoT security...
Jan 17, 2019
1,949
0
As machine learning and artificial intelligence make great strides, there is application of them in all spheres of life—from health and education to agriculture and mining. Cyber security is no...
Jan 17, 2019
237
0
In the realm of cyber-intrusion onto virtual reality, growing corporates are stringently concerned on seamless business continuity. Off late IT is augmented as a service in a delicate dilemma of...
Jan 16, 2019
1,935
0
Like CIOs, quite a few Chief Information Security Officers (CISOs) too moved to newer opportunities in 2018. If the list looks smaller, it is because the overall list is smaller—there are far lesser...
Jan 10, 2019
1,709
0
The customary approach to organizational security involves usage of a variety of processes and tools to carry out incident management, infrastructure network defense, and threat management. Threat...
Jan 10, 2019
337
0
India’s privacy legislation is in the making. The draft Personal Data Protection bill has already been released for public comments. Section 36 of the draft bill mandates that each data fiduciary—...
Jan 07, 2019
245
0
In a little over a decade, the World Wide Web has evolved from purely static information repositories into highly functional applications that process sensitive data and perform powerful actions with...
Jan 03, 2019
398
0