Businesses across the globe have started to see information security as a business priority and this alignment has enhanced the influence of CISOs on top management, says Biju K, Chief Information Security Head of Federal Bank.
Here’s all you need to know about ManageEngine’s zero-day vulnerabilities, and what the company has done to remediate the problem
There’s no denying that fortifying defenses is the first step to cyber-resiliency. What takes a back seat though, is the lack of proper incident response plans. IBM-Ponemon’s 2018 cyber-resiliency study reveals 77 percent of firms lack proper incident response plans.
As mobile device use increases among U.S. government workers, IT and security officials are scrambling to better secure devices, leaving behind traditional anti-malware tools in favor of mobile threat detection and role-driven access rules.
APT37, popularly known as Reaper has been primarily targeting the chemicals, electronics, manufacturing, aerospace, automotive, and healthcare industries for North Korean state interests.
Security expert and Pluralsight author, Dale Meredith, explains how to protect your enterprise from hackers by focusing on mobile security. Learn more.
In wake of the National Cyber Security Coordinator’s startling revelation of 1.5 lakh online transactions being compromised every day, digital payment companies in India are walking on thin ice when it comes to protecting user data.