Feature

What is an intrusion detection system (IDS)? A valued capability with serious management challenges

An IDS monitors network traffic, searching for suspicious activity and known threats and sending up alerts when it finds such items. The function remains critical in the modern enterprise, but maybe not as a standalone solution.

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that does business in Europe needs to know about GDPR.

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

Income Tax dept. targets cryptocurrency investments; taxation on par with LTCG

Right from reporting to tracking transactions, here’s all you need to know about cryptocurrency taxation in India.

Union Budget 2018: Impressive IT investments, but no cybersecurity measures

FM Arun Jaitley may have announced substantial allocations to new technologies but without a proper cybersecurity framework, IT leaders wonder where it will lead.

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

Cryptocurrency not legal in India; many nations adopt investor friendly approach

Instead of refusing legal status to cryptocurrencies as in the case of India and China, other major countries plan trade regulations to control illicit activities.

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

New kids on the block: AR-VR, wearables and 3D printing

SMAC architecture is passé, and every sector is now headed to a time of augmented reality-virtual reality, wearables, and 3D printing