Vulnerabilities

Best computer security tips

Computers are such an integral part of life now, that it can be easy to take them for granted. But, with so much of our personal, financial, and legal information accessible through your PC, laptop and phone, it’s essential that we keep them and Windows 10 secure.

Why is Bitcoin such a security hazard?

Despite the promise of Blockchain technologies to bring better security to online transactions and business processes, its rapid growth and adoption is bringing new cyber risks with equal force that will likely evolve with continued success.

The most notorious hacker groups

Today increasingly sophisticated cyber attacks are crafted, honed, and improved by shady groups of hackers, often using custom tools that are directed at high value people, businesses, or even countries.

Shitij Bhatia

At Lupin, Shitij Bhatia implemented security solutions across two phases—virtual patching for the datacenter, and then protection for servers, network and email. Considering the possibility of future migration to cloud they implemented a future-proof solution with cloud capabilities. 

Bithal Bhardwaj

Led active engagements with industry influencers to help drive change in larger ecosystem for secure operating environment for the companies in the region.

Fortinet introduces ML capabilities to its FortiWeb web application firewall

The new innovations to FortiWeb provide a dramatic increase in detecting web application threats with nearly 100 percent accuracy.

AMP appoints data scientist to cyber team to meet ‘audacious’ target

Last year, AMP’s cyber team took a “fairly audacious target” to the board: bring down the number of cyber security vulnerabilities across the company by ten to 15 per cent every month.

Trend Micro expands security solutions for containers

This component provides continuous container image scanning to complement the existing Deep Security runtime container protection.

Partner Content
The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Most big surveys reckon that human errors are at the heart of security incidents.

Partner Content
How cybersecurity laws play an important role in securing your organization

Over the last few years, the key buzzword has been cybersecurity, thanks to the number of breaches and vulnerabilities that have occurred.

Partner Content
How hackers use spam to maximize the impact of a cyber attack?

‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services.

Partner Content
5 Critical corporate cybersecurity risks for SMBs

If you are the owner of a SMB, you cannot underestimate the importance of having a strong cybersecurity defence.