Social Engineering

Privileged access is a critical pathway to all attacks: Jeffrey Kok, CyberArk

By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.

Partner Content
5 Critical corporate cybersecurity risks for SMBs

If you are the owner of a SMB, you cannot underestimate the importance of having a strong cybersecurity defence.

Apple and Google harden their smartphones against hackers and governments

As techniques used by criminals and law enforcement become known, the two leading smartphone makers are adapting to protect user data.

Partner Content
Key vulnerabilities in SMBs: Devices and people

On one hand, unlike the big business enterprises, SMBs may not always have the financial heft to really invest in cybersecurity solutions, which often leads to that taking a backseat.

Why blockchain isn’t always the answer

Blockchain vendors are touting the technology as a solution to many security (and other) problems. Consider costs and alternatives before jumping on the bandwagon.

5 signs you've been hit with an advanced persistent threat

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

Sophos introduces Phish Threat attack simulator and training solution

xPhish Threat simplifies a key part of an organizations security strategy- employee awareness and training.

What hackers do: their motivations and their malware

Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.

Data Privacy: How you can mitigate violation

In this edition of Explained, we explore the serious need for users to be vigilant and vary while giving away their personal data, post the Aadhaar breach and Facebook-Cambridge Analytica expose.

 

Script edited by Shantheri Mallaya

Post production by Kshitish

Voice Over by Soumik Ghosh

 

Trend Micro detects and blocks 3.4mn high-risk email threats in 2017

Cloud App Security managed to detect over 50,000 ransomware and 3,000 BEC threats in the last three quarters of 2017.

Six myths CEOs believe about security

Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions.