Privileged access is a critical pathway to all attacks: Jeffrey Kok, CyberArk

By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.

Victims of malicious crypto miners increases by 44 percent: Study

Statistics for the last 24 months show that miners are increasingly focused on developing markets and are taking advantage of internet users in these regions to grow their revenues.

Sophisticated attacks go undetected with traditional security solutions: CrowdStrike

Speaking at IDG Security Day & CSO 100 Awards 2018, Ramanand Kambli and Satbir Singh from CrowdStrike highlighted how attacks are getting sophisticated, and how enterprises can address all security challenges with their cloud-based offering. 

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

More than 3 million cryptojacking hits detected in 2018: Study

The number of mobile cryptojacking malware variants have grown to 25 by May 2018 from 8 in 2017, marking a three-fold increase.

Best computer security tips

Computers are such an integral part of life now, that it can be easy to take them for granted. But, with so much of our personal, financial, and legal information accessible through your PC, laptop and phone, it’s essential that we keep them and Windows 10 secure.

Why is Bitcoin such a security hazard?

Despite the promise of Blockchain technologies to bring better security to online transactions and business processes, its rapid growth and adoption is bringing new cyber risks with equal force that will likely evolve with continued success.

The most notorious hacker groups

Today increasingly sophisticated cyber attacks are crafted, honed, and improved by shady groups of hackers, often using custom tools that are directed at high value people, businesses, or even countries.

Jayan N

At Servion Global Solutions, Jayan N implemented an end-point protection suite with advance malware protection software to safeguard the organization against ransomware/malware attacks.

Aditya Khullar

At Paytm, Aditya Khullar implemented threat intelligence for securing the organization's vast infrastructure. Under the project, threat advisories were created on a real-time basis to prevent the various attack vectors such as ransomware and botnets. 

Amit Vijay Ghodekar

Amit Vijay Ghodekar led the implementation of deception technology along with unified security at Motilal Oswal Financial Services. Under the new security strategy, intelligence generated from Anti-APT Solution and server security solution were integrated with products like ant-virus, anti-malware, and MDM along with deception technology.

Pooja Chatrath

At Cryoviva Biotech, Pooja Chatrath implemented a solution that works silently at the file system level, keeping track of remote computers and local processes that attempt to modify the organization’s files. It helped to understand what files, processes, and registry keys were touched by the malware so as to activate their advanced system clean up to rewind time.