2018 looks much more promising with mass market deployments especially in industrial IoT space which offers strong tangible benefits. But what does this mean to the CIO?
BFSI companies were possibly the biggest target of cyber criminals over the last couple of years. The trend is likely to continue as cyber criminals will continue to find innovative ways to steal identity and money.
The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018
CISOs will face new challenges as enterprises transition to cloud and adopt IoT. Here’s what they can expect to manage in the new year.
The era of cloud and IoT has heightened the role of the Chief Information Security Officer (CISO) in enterprises. Increasing sophisticated threats complicated by the lack of a skilled security workforce add to the challenges
The perpetual catch up game between hackers and CISOs is resulting in a steadily rising cybersecurity budget. We take a look at what’s driving this trend and assess the security roadmap in 2018.
Given the new age threat landscape, CIOs and CSOs across the board can no longer bank upon a fortified periphery that would protect the organization’s crown jewels.
Virsae has unveiled plans to tackle rising toll fraud costs, through the introduction of a security management solution leveraging unified communications capabilities.
Intel told investors it will ship silicon that patches Spectre and Meltdown in hardware, while reporting record revenue for the fourth quarter of 2017. But Intel's statements leave us with more questions than answers.
Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.
Finding and fixing these vulnerabilities before the attackers can take advantage of them is a proactive defensive measure that is an essential part of any security program.