Security

Partner Content
Poor network visibility: Don't put your enterprise's security at risk

The number of devices that connect to enterprise networks is exponentially growing, leading to an inter-connected information highway. The size, complexity, and mobility of modern network environments are continuously increasing.

Partner Content
Key vulnerabilities in SMBs: Devices and people

On one hand, unlike the big business enterprises, SMBs may not always have the financial heft to really invest in cybersecurity solutions, which often leads to that taking a backseat.

Negligent Employee: A dangerous internal cyber threat

As organizations cope with the changing world of cybersecurity which continues to evolve at a frantic pace, they sometimes forget to neglect the danger that stares at them in their face.

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

What is PGP encryption? How to protect against the PGP vulnerability

German researchers have found a major vulnerability in PGP (Pretty Good Privacy), a popular email encryption program, which could reveal past and present encrypted emails.

Aditya Birla Group suffers cryptojack attack; 2000 computers used for mining Monero

First detected at an overseas subsidiary of the group a month ago, the malware spread to manufacturing and other services companies of Aditya Birla group. Monero was the currency mined.

5 top trends in endpoint security for 2018

Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as well.

CSO Alert: A panel discussion on the ever-widening skill gap- The teaser

As CSO alert reaches its 50th episode, we had a discussion with Sandip Kumar Panda, Chairperson-CSA, Co-founder and CEO, Instasafe and Shubhamangala Sunil, Founder Chairperson, Global Cyber security Response Team and technical committee member- National Cyber Safety and Security Standards on bridging the skill gap in India, impact of GDPR compliance, cyber forensics and much more! 

To watch the entire video click here.

Getting grounded in IoT networking and security

A guide to the basics enterprises need to know about the internet of things.

What is a Chief Security Officer? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.