Vulnerabilities

Shitij Bhatia

At Lupin, Shitij Bhatia implemented security solutions across two phases—virtual patching for the datacenter, and then protection for servers, network and email. Considering the possibility of future migration to cloud they implemented a future-proof solution with cloud capabilities. 

Bithal Bhardwaj

Active engagements with industry influencers to help drive change in larger ecosystem for secure operating environment for the companies in the region.

Fortinet introduces ML capabilities to its FortiWeb web application firewall

The new innovations to FortiWeb provide a dramatic increase in detecting web application threats with nearly 100 percent accuracy.

AMP appoints data scientist to cyber team to meet ‘audacious’ target

Last year, AMP’s cyber team took a “fairly audacious target” to the board: bring down the number of cyber security vulnerabilities across the company by ten to 15 per cent every month.

Trend Micro expands security solutions for containers

This component provides continuous container image scanning to complement the existing Deep Security runtime container protection.

Partner Content
The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Most big surveys reckon that human errors are at the heart of security incidents.

Partner Content
How cybersecurity laws play an important role in securing your organization

Over the last few years, the key buzzword has been cybersecurity, thanks to the number of breaches and vulnerabilities that have occurred.

Partner Content
How hackers use spam to maximize the impact of a cyber attack?

‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services.

Partner Content
5 Critical corporate cybersecurity risks for SMBs

If you are the owner of a SMB, you cannot underestimate the importance of having a strong cybersecurity defence.

Intel discloses new vulnerability that could affect Core family CPUs

With Meltdown and Spectre variants still on the map, another security vulnerability has emerged that affects Intel processors’ speculative execution technology.

5 major cyberattacks and hacks of 2017

As we approach IDG Security Day on June 21, here is a glance at the major hacks, threats and ransomware attacks that shook the industry last year.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.