Network Security

US, UK, Aussie blame Russia for 2017 NotPetya attacks

After being held responsible for the attack on the Winter Olympics, Russia is under the spotlight yet again for another cyberattack.

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

The Qubes high-security operating system gains traction in the enterprise

Qubes OS defends at-risk enterprise users from targeted attacks, as well as drive-by malware and the Meltdown exploit.

Architecture-based, futuristic security to rule in 2018: Bhaskar Bakthavatsalu, Check Point

CISOs will transition from a point product solutions approach to ‘Framework & Security Consolidation’ approach says Bhaskar Bakthavatsalu, MD, Check Point, India & SAARC.

Proactive protection is the best shield for CISOs: Nilesh Jain, Trend Micro

"We are primarily focused to deliver proactive protection to customers across server security, endpoint security and network security", says Nilesh Jain, Vice President – South East Asia and India, at Trend Micro India. 

Security must not be a tactical necessity in 2018: Anil Bhasin, Palo Alto Networks

CISOs will evolve as an influential and importantly equal business stakeholder in digital companies says Anil Bhasin at Palo Alto Networks.
 

2018 will be the year of synchronised security: Sunil Sharma, Sophos

Synchronized security is the right ammo for businesses of all sizes, especially in this highly digitized world says Sunil Sharma, MD, Sophos India.

Building a data-driven organization with IoT and AI

IoT and AI will bring large and diverse data sets that will result in new challenges. Here’s how organizations can leverage these technologies to become data driven.

Ashish Thapar: With data breach, prevention is worth a pound of cure

Unless you make resiliency a priority, your data and reputation will remain at risk in digitization world, says Ashish Thapar of Verizon Enterprise Solutions

The most sought after cybersecurity skills in 2018

The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018