In this edition of Explained, we explore the serious need for users to be vigilant and vary while giving away their personal data, post the Aadhaar breach and Facebook-Cambridge Analytica expose.
Script edited by Shantheri Mallaya
Post production by Kshitish
Voice Over by Soumik Ghosh
FortiOS 6.0 delivers more than 200 new capabilities across Security Fabric to automate security operations and protect the digital attack surface
APT37, popularly known as Reaper has been primarily targeting the chemicals, electronics, manufacturing, aerospace, automotive, and healthcare industries for North Korean state interests.
Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.
Cyber scammers have figured out that the Australian real estate industry is a potential gold mine for social engineering attacks, according to Alex Tilley, a senior security researcher at SecureWorks.
BFSI companies were possibly the biggest target of cyber criminals over the last couple of years. The trend is likely to continue as cyber criminals will continue to find innovative ways to steal identity and money.
The role of a Chief Information Security Officer (CISO) is changing from that of an IT security manager to that of a C-suite executive who secures the business interests of the enterprise.