Application Security

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

Union Budget 2018: Impressive IT investments, but no cybersecurity measures

FM Arun Jaitley may have announced substantial allocations to new technologies but without a proper cybersecurity framework, IT leaders wonder where it will lead.

2018 will be the year of synchronised security: Sunil Sharma, Sophos

Synchronized security is the right ammo for businesses of all sizes, especially in this highly digitized world says Sunil Sharma, MD, Sophos India.

The most sought after cybersecurity skills in 2018

The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018

Security in the era of cloud and IoT: The CISO’s job gets tougher

CISOs will face new challenges as enterprises transition to cloud and adopt IoT. Here’s what they can expect to manage in the new year.
The era of cloud and IoT has heightened the role of the Chief Information Security Officer (CISO) in enterprises. Increasing sophisticated threats complicated by the lack of a skilled security workforce add to the challenges

Millenials more likely to use biometrics, MFA to improve personal security: Study

IBM Security’s global study shows how Indian respondents are more technology-inclined compared to their global counterparts.

Rise of BYOD, BYOA adds to network security woes across organizations: Fortinet

Fortinet advises CISOs to mitigate risks from BYOD and BYOA by implementing a ‘layered’ cybersecurity approach with increased visibility

Crowdstrike-Valuepoint Techsol's ML-based platform aims to secure enterprises on cloud

Crowdstrike’s new security platform will be deployed and hosted from partner Valuepoint Techsol’s SOC.

This hacker is rating software security Consumer Reports-style

The Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices.

People, data and network are constants for modern enterprise: George Chang, Forcepoint

To understand and tackle issues of cybersecurity, enterprises must first decode the intersection of users, data and network, says George Chang, Head–APAC, Forcepoint.

Three API security essentials for enterprises

With enterprises heavily depending on APIs for growth, API security has emerged as a business-critical component today. Tips to employ an effective API security framework.

What is DevSecOps? Developing more secure applications

DevSecOps is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives.