Security

Take-aways from Black Hat USA 2018

Black Hat USA 2018 had record crowds, revealed a growing attack surface, and proved we have lots of work ahead.

Does Facebook even need a CSO?

Maybe not, says Twitter’s former CISO, but there are risks with Facebook's move from a centralized to a distributed security model in the wake of Alex Stamos's departure.

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

Australian Govt releases proposed reform to encryption laws

The Federal Government has published the changes it proposes in order to access encrypted communications.

How CIOs should respond to a data breach

How prepared is your organisation to deal with the fallout from a cyber attack?

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

Seqrite detects more than 1.5 lakh incidents related to the Emotet Trojan

Reveals how the infamous Trojan has evolved into a complex malware capable of delivering multiple attack payloads such as Banking Trojans.

Fortinet signs cyber threat information sharing agreement with IBM

The goal of the agreement is to proactively combat cyber threats and threats to privacy globally through the sharing of contextual threat information generated by the Fortinet FortiGuard Labs threat research team and IBM Security X-Force research team.

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

Partner Content
India’s NEW Personal Data Protection Law is almost here. Are you ready?

With the Indian Government releasing the Justice BN Srikrishna Committee of Experts Report on Data Protection recently, a new law in the form of the Personal Data Protection Bill, 2018, is all set to soon become a reality in India.

Juniper Networks accelerates firewall performance for Cloud, 5G, IoT

Juniper’s new service processing card for SRX5000 line of firewalls significantly increases performance, scale and extensibility.

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.