Vulnerabilities

IoT and the big data explosion: How are the CIOs coping?

2018 looks much more promising with mass market deployments especially in industrial IoT space which offers strong tangible benefits. But what does this mean to the CIO?

BFSI sector will be the key target of cyber criminals in 2018

BFSI companies were possibly the biggest target of cyber criminals over the last couple of years. The trend is likely to continue as cyber criminals will continue to find innovative ways to steal identity and money.

The most sought after cybersecurity skills in 2018

The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018

Security in the era of cloud and IoT: The CISO’s job gets tougher

CISOs will face new challenges as enterprises transition to cloud and adopt IoT. Here’s what they can expect to manage in the new year.
The era of cloud and IoT has heightened the role of the Chief Information Security Officer (CISO) in enterprises. Increasing sophisticated threats complicated by the lack of a skilled security workforce add to the challenges

Security budgets of Indian organizations: Where is it heading?

The perpetual catch up game between hackers and CISOs is resulting in a steadily rising cybersecurity budget. We take a look at what’s driving this trend and assess the security roadmap in 2018.

Emerging technologies to combat new age threats

Given the new age threat landscape, CIOs and CSOs across the board can no longer bank upon a fortified periphery that would protect the organization’s crown jewels.

Virsae unveils fraud busting security solution

Virsae has unveiled plans to tackle rising toll fraud costs, through the introduction of a security management solution leveraging unified communications capabilities.

Intel's plan to fix Meltdown in silicon raises more questions than answers

Intel told investors it will ship silicon that patches Spectre and Meltdown in hardware, while reporting record revenue for the fourth quarter of 2017. But Intel's statements leave us with more questions than answers.

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

Crowdstrike-Valuepoint Techsol's ML-based platform aims to secure enterprises on cloud

Crowdstrike’s new security platform will be deployed and hosted from partner Valuepoint Techsol’s SOC.

Partner Content
Vulnerability Management: A guide for buyer

Finding and fixing these vulnerabilities before the attackers can take advantage of them is a proactive defensive measure that is an essential part of any security program.