By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.
Statistics for the last 24 months show that miners are increasingly focused on developing markets and are taking advantage of internet users in these regions to grow their revenues.
Speaking at IDG Security Day & CSO 100 Awards 2018, Ramanand Kambli and Satbir Singh from CrowdStrike highlighted how attacks are getting sophisticated, and how enterprises can address all security challenges with their cloud-based offering.
Computers are such an integral part of life now, that it can be easy to take them for granted. But, with so much of our personal, financial, and legal information accessible through your PC, laptop and phone, it’s essential that we keep them and Windows 10 secure.
Despite the promise of Blockchain technologies to bring better security to online transactions and business processes, its rapid growth and adoption is bringing new cyber risks with equal force that will likely evolve with continued success.
Today increasingly sophisticated cyber attacks are crafted, honed, and improved by shady groups of hackers, often using custom tools that are directed at high value people, businesses, or even countries.
At Paytm, Aditya Khullar implemented threat intelligence for securing the organization's vast infrastructure. Under the project, threat advisories were created on a real-time basis to prevent the various attack vectors such as ransomware and botnets.
Amit Vijay Ghodekar led the implementation of deception technology along with unified security at Motilal Oswal Financial Services. Under the new security strategy, intelligence generated from Anti-APT Solution and server security solution were integrated with products like ant-virus, anti-malware, and MDM along with deception technology.
At Cryoviva Biotech, Pooja Chatrath implemented a solution that works silently at the file system level, keeping track of remote computers and local processes that attempt to modify the organization’s files. It helped to understand what files, processes, and registry keys were touched by the malware so as to activate their advanced system clean up to rewind time.