Physical security

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

Serious vulnerabilities discovered in IoT-based surveillance cameras

Smart security cameras manufactured by global brand Hanwha Techwin have been discovered to be vulnerable to remote attacks, exposing even the other devices on the network to security threats.

 

Indian businesses report higher vulnerability to fraud, says Kroll report

Kroll, a corporate investigations and risk consulting firm based in the US, has published its 10th annual Global Fraud & Risk Report. The survey conducted among business executives across the globe has reported higher rate of fraud incidents in India when compared to the global average. 
 

Reaper emerges a cyber security threat for global enterprises

APT37, popularly known as Reaper has been primarily targeting the chemicals, electronics, manufacturing, aerospace, automotive, and healthcare industries for North Korean state interests.

Partner Content
Learning Path: Developing Microsoft Azure and Web Services (Microsoft Exam 70-487)

Microsoft offers a set of certifications that validate a software developer's expertise in Microsoft technologies. 

Partner Content
Learning Path: Architecting Microsoft Azure Solutions (70-534)

Microsoft Azure is a complex suite of interconnected services that also have ties to your on-premises infrastructure.

Partner Content
Learning Path: Web Application Development with ASP.NET MVC5

ASP.NET MVC is a web application framework from Microsoft built on ASP.NET, which implements the Model-View-Controller design pattern.

Partner Content
Editor's Playlist: Developing ASP.NET MVC Web Applications (Microsoft Exam 70-486)

Microsoft offers a set of certifications that validate a software developer's expertise in Microsoft technologies. 

Partner Content
Creating a security-centric culture

Security can’t be an afterthought. To really keep your organization secure, everyone needs to get on board and make security best practices a company-wide priority.

Partner Content
The big security threats your organization needs to take seriously now

This whitepaper promises to peel the veil back and take a no-holds-barred, brutally honest view at security risks for your enterprise. 

2018 will be the year of synchronised security: Sunil Sharma, Sophos

Synchronized security is the right ammo for businesses of all sizes, especially in this highly digitized world says Sunil Sharma, MD, Sophos India.

Dinesh Kumar Aggarwal: Encryption is king and the king is nude

In the real world no one keeps the keys of a treasure along with the lock. However, this principle is easily forgotten in the virtual world while using encryption.