Security

The National Health Authority has come out with a draft National Health Data Management Policy which proposes to create a 'digital health id' for all citizens so an individual's personal health...
Sep 08, 2020
772
0
Bring your own PC (BYOPC) security will reach mainstream adoption in the next two to five years, while it will take five to 10 years for mainstream adoption of secure access service edge (SASE) to...
Aug 27, 2020
878
0
More than 90% of business leaders say cloud is a priority in the COVID-19 shutdown. They are relying more on cloud technologies but are seeing more cybersecurity attacks. Half a year into the...
Aug 21, 2020
1,137
0
Software-defined wide-area networking (SD-WAN) is rapidly replacing the traditional WAN for remote office and branch deployments. SD-WAN was designed to provide a wide range of benefits to support...
Aug 10, 2020
1,016
0
Julius Caesar is a play by William Shakespeare; in it, there is a famous phrase that is often quoted, "Beware of the Ides of March." Apparently, Caesar was warned about the Ides, which falls on March...
Jul 30, 2020
2,175
0
The COVID-19 crisis led countries and organizations to shut down physical offices and move operations online. This was not easy as IT professionals and departments needed to maintain business...
Jul 29, 2020
1,279
0
Risk Management is undergoing an evolution as we respond, reimagine and reform the operating model. At the forefront of enabling the new ways of operating, lie employee safety and ability to provide...
Jul 21, 2020
1,584
0
It took some time but by now, most of us have accepted the new reality, that is, living life with COVID-19. This year’s pandemic has put the entire world to a standstill and forced organizations to...
Jun 17, 2020
2,235
0
Most companies see strong business drivers to adopt IoT as part of a broader digital transformation process, according to Syniverse-Omdia study. Improved efficiency and productivity, improved product...
Jun 02, 2020
2,134
0
While adoption rates for public cloud continue to grow, security is still the number one roadblock, which is understandable considering the volume and variety of threats organizations face today,...
Feb 21, 2020
3,503
7
Vikas Arora has been appointed as the Global SVP for IT & Security at ITWP Group of Companies including Toluna, Harris Interactive and KuRunData. Prior to this, he was VP - Global IT &...
Feb 10, 2020
2,251
3
Modern applications are difficult to secure. Whether they are web or mobile, custom developed or SaaS-based, applications are now scattered across different platforms and frameworks. To accelerate...
Dec 12, 2019
712
2
Zscaler, the leader in cloud security, today announced that Zscaler Private Access (ZPA) is the first zero trust architecture to achieve Amazon Web Service (AWS) Security Competency status. The ZPA...
Oct 29, 2019
4,222
2
Akamai, the intelligent edge platform for securing and delivering digital experiences, recently announced enhancements focused on maximizing security, quality, and reliability from the cloud to the...
Oct 16, 2019
4,941
6
Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, recently announced that IndiGo, India’s largest airline, has deployed Fortinet Secure SD-WAN solution across its...
Sep 30, 2019
4,491
3
Internet users in Asia-Pacific want security and privacy guarantees for the Internet of Things (IoT) -- the rapidly expanding network of devices, physical objects, services and applications that...
Sep 30, 2019
4,428
3
Cybersecurity issues are increasingly becoming a concern in merger and acquisition (M&A) deals, shows a new research report. The study conducted by Forescout suggests that IT and business...
Jul 08, 2019
4,706
5
Trend Micro, a global leader in cybersecurity solutions, today announced it has blocked 5 million attempted cyberattacks against IP cameras in just five months. Through its strategic partnership with...
Jun 28, 2019
2,781
0
Leveraging the automation continuum is security and risk management leaders’ latest imperative in creating and preserving value at their organization, according to Gartner. Katell Thielemann,...
Jun 20, 2019
4,293
1
Recently, a new class of Intel CPU vulnerabilities was published by the microchip giant. Known as speculative execution side-channel vulnerabilities, they affect almost every Intel processor produced...
May 29, 2019
3,843
0
It is elections time and there has been huge uproar over the electronic voting machines (EVMs) as opposition accuses the government of manipulation. But that is politics. What cannot be taken lightly...
May 22, 2019
5,645
6
Trend Micro, a global leader in cybersecurity solutions, today announced the availability of the industry’s most complete security from a single solution protecting across cloud and container...
May 16, 2019
1,797
1
Unsecured Internet of Things or IoT devices in the workplace and those used by third parties are causing large scale cyber attacks, disrupting the privacy and security of organizations. But most...
May 09, 2019
5,058
3
IceWarp, an all-in-one email collaboration platform for communication got certified by ISO. Accruing the ISO 27001 Certification has been highly beneficial for IceWarp and will reduce risks and...
Apr 23, 2019
1,597
1
Akamai, the intelligent edge platform for securing and delivering digital experiences, today announced enhancements designed to help businesses accelerate their cloud migration strategy. The new...
Mar 11, 2019
4,581
5
Sify Technologies, an ICT Solutions and Services leader in India, today announced a partnership with GMO GlobalSign, a leading provider of trusted identity and security solutions and one of the...
Dec 20, 2018
2,344
1
A majority of consumers are willing to walk away from businesses entirely if they suffer a data breach, with retailers most at risk, according to Gemalto. Two-thirds (66%) are unlikely to shop or do...
Dec 13, 2018
4,679
0
Symantec today introduced Industrial Control System Protection (ICSP) Neural, the industry’s first neural network-integrated USB scanning station that helps organizations protect critical...
Dec 07, 2018
5,205
1
Enabling the business outcome in a ‘Real-Time’ enterprise environment is the next challenge for global brands and government agenciesin 2019. Tech companies will need to drive hard to continually...
Nov 30, 2018
3,427
0
Gemalto, the global leader in digital security, is expanding highly efficient IoT connectivity with the launch of its Cinterion Narrowband IoT (NB-IoT) wireless module platform. The new solution...
Nov 26, 2018
4,385
1
A new global research report by Barracuda Networks, “Security, Connectivity, and Control: The Challenges and Opportunities of SD-WAN” surveyed IT leaders and networking and security professionals to...
Oct 29, 2018
3,926
0
APAC is ahead of the US and EMEA in terms of automation for processes involved in the management of firewall rules and security policy, according to the results of a global survey conducted by...
Oct 29, 2018
6,926
2
Asia/Pacific excluding Japan (APeJ) spending on security related hardware, software and services will reach USD 28.76 billion in 2022 with a compound annual growth rate (CAGR) of 20.7% over the...
Oct 26, 2018
5,927
1
Account takeover (ATO) attacks, in which a person's credentials are stolen and used to send emails from their real account, have multiple objectives. Some attackers try to use the hacked email...
Oct 09, 2018
16,404
4
After documenting improvements in Payment Card Industry Data Security Standard (PCI DSS) compliance over the past six years (2010 – 2016), Verizon’s 2018 Payment Security Report (PSR) now reveals a...
Sep 27, 2018
5,183
4
Many network security threats today go uninvestigated, with IT professionals struggling to accurately prioritize alerts due to the overwhelming volume generated in an increasingly cloud-reliant work...
Sep 26, 2018
4,611
0
ManageEngine, the real-time IT management company, announced its launch of Browser Security Plus, a browser management solution that helps organizations secure their corporate data in the cloud and...
Sep 21, 2018
4,916
4
According to the Akamai 2018 State of the Internet/Security Credential Stuffing Attacks report, worldwide malicious login attempts are on the rise. Findings from the report show that Akamai detected...
Sep 20, 2018
5,777
6
Indian consumers are more likely to trade off on app security for convenience, according to a study commissioned by F5 Networks ‘The Curve of Convenience – the trade-off between security and...
Sep 19, 2018
5,246
1
Rather than looking at the overwhelming and ever-increasing number of threats, your focus should be on identifying those that pose a real risk to your business and knowing the right patching and...
Sep 07, 2018
6,545
1
Axis Communications, the market leader in network video, at Axis Solutions Day 2018, shared implementation details of their large-scale community CCTV Nenu Saitham project in Hyderabad City. The...
Aug 28, 2018
5,876
1
Dish TV India Limited, world’s largest single country DTH Company, has achieved the ISO 27001 Certification, the international standard that sets out and describes requirements and best practices for...
Jun 20, 2018
2,891
1
In the last 3-4 years, several surveys have concluded that skills shortage is one of the top challenges for the enterprise community. Almost all major conferences have devoted hours of planned—and...
Jun 01, 2018
5,290
0
The General Data Protection Regulation (GDPR) designed to give citizens in the European Union (EU) more rights to control their personal information also applies to an Indian entity if it monitors...
May 28, 2018
1,907
0
MediaTek announced its collaboration with Microsoft to deliver the first ever Azure Sphere chip, the MT3620 that will drive IoT innovation with built-in security and connectivity. Azure Sphere is a...
Apr 17, 2018
7,006
2
Poor visibility is one of the greatest challenges to cloud adoption in an organization, according to McAfee’s Navigating a Cloudy Sky: Practical Guidance and the State of Cloud Security report....
Apr 16, 2018
4,970
0
Fortinet has said that the general lack of cybersecurity safeguards in fintech companies has raised serious concerns around data protection and compliance, especially with the implementation of...
Apr 11, 2018
3,249
2
Although enterprises in the Asia-Pacific and Japan (APJ) region are more bullish on adopting Artificial Intelligence (AI) in the Cloud when compared to their global counterparts, they are behind the...
Mar 29, 2018
3,797
0
A new report by Morphisec, a cybersecurity startup from Israel, has discovered that a stealth attack technique dubbed CIGslip that could be exploited by attackers to bypass MS Code Integrity Guard...
Mar 20, 2018
9,370
3