Data breach

Partner Content
Spotted unusual activity on network: Here's what to do next

Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an enterprise network.

Partner Content
Here's the checklist of an efficient endpoint security solution

Most attacks on an organization can be traced back to devices connected to enterprise networks, which is basically an endpoint. And hence, that is why it is extremely important for an enterprise to ensure that their endpoints remain safe and secure.

Partner Content
Key vulnerabilities in SMBs: Devices and people

On one hand, unlike the big business enterprises, SMBs may not always have the financial heft to really invest in cybersecurity solutions, which often leads to that taking a backseat.

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

Sure, you’ve prepared for attacks and breaches, but how well can core business processes function when a crisis hits?

What to do after a data breach: 5 steps to minimize risk

Website database breaches happen, and while there's little you can do to prevent them you can minimize your exposure. Here's what to do.

Employees Provident Fund portal compromised; Aadhaar the weakest link yet again

Amidst reports of confidential user data being compromised on the EPFO portal, the government retaliated with its sure-fire hack remedy – by taking the site offline.

Partner Content
More than 2.5 billion records stolen or compromised in 2017

Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal threats were the fastest growing security risks for companies

Why blockchain isn’t always the answer

Blockchain vendors are touting the technology as a solution to many security (and other) problems. Consider costs and alternatives before jumping on the bandwagon.

Most companies won’t be ready for EU GDPR : Winmagic

Across India, 65 percent of companies have complete confidence in their ability to report all data breaches however small to the authorities within 72 hours of discovery.

What does it take for companies to stay on top in the new landscape of data security

Eight new cyber threats detected every second; organizational compliance failure is the main reason behind this surge. Compliance transcends geographical boundaries; companies find themselves cornered by rising security threats, and increasingly complex laws. Most data is on the Cloud, and most of it is highly sensitive as well as unstructured data.