Phishing

7 threat modeling mistakes you’re probably making

The relative lack of maturity around threat modeling can cause big problems for organizations seeking to adopt the practice to bolster their network and services security.

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

Security must not be a tactical necessity in 2018: Anil Bhasin, Palo Alto Networks

CISOs will evolve as an influential and importantly equal business stakeholder in digital companies says Anil Bhasin at Palo Alto Networks.
 

BFSI sector will be the key target of cyber criminals in 2018

BFSI companies were possibly the biggest target of cyber criminals over the last couple of years. The trend is likely to continue as cyber criminals will continue to find innovative ways to steal identity and money.

Regulatory regime for BFSI: How information security will play a critical role

Regulatory agencies like RBI and IRDAI are taking steps to secure BFSI companies from cyber threats.

Security budgets of Indian organizations: Where is it heading?

The perpetual catch up game between hackers and CISOs is resulting in a steadily rising cybersecurity budget. We take a look at what’s driving this trend and assess the security roadmap in 2018.

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed?

Are bad analogies killing your security training program?

Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help.

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

Safeguarding your biggest cybersecurity target: Executives

Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.

Vodafone, Trend Micro partner to launch end-point security suite for enterprises

The companies partnered to launch Vodafone Super Shield, backed by Trend Micro’s cloud based global smart protection network.