Healthcare professionals are mostly concerned about the risks associated with Internet of Things (IoT), medical devices, third-party vendors, and program development/management, according to...
Jun 12, 2019
The most prevalent types of threat actors and attack vectors of recent years will remain consistent but increase in attack volume in 2019, according to cybersecurity professionals polled in the 2nd...
Jun 11, 2019
As massive data breaches continue to make international headlines and the Internet is an integral part of our daily lives, consumers are now grasping the risks they face. In a new F-Secure survey, 71...
May 31, 2019
In recent years, cyber security attacks have increased substantially and companies have to bear phenomenal losses to safeguard themselves from the clutches of security threats. The latest threat...
May 30, 2019
Kaspersky Lab, a cybersecurity and anti-virus company, has revealed a rise in a specific malware intended to steal money and credentials from people’s bank accounts. 29,841 files of the malware in Q1...
May 24, 2019
C-level executives, who have access to a company’s most sensitive information, are now the major focus for social engineering attacks, alerts the Verizon 2019 Data Breach Investigations Report....
May 08, 2019
The global Internet of Things (IoT) security market size will grow from USD 8.2 billion in 2018 to USD 35.2 billion by 2023, at a Compound Annual Growth Rate (CAGR) of 33.7% during the forecast...
Apr 30, 2019
The guest gets out of a nice car, swivels a swanky fob of keys on a finger and approaches a well-dressed valet. The smiling attendant takes down a few details and walks off with the car keys. Only to...
Apr 30, 2019
There is nothing like an unpickable lock. From the wooden pin-locks of ancient Egypt to the modern Yale and Schlage locks; locksmiths have been trying all possible contraptions and creative devices...
Apr 30, 2019
Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations improve in areas such as...
Apr 26, 2019
Trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences, according to Experian’s 2019 Identity and Fraud Report: Asia-Pacific...
Apr 23, 2019
It is no secret that ransomware and other cyberattacks are rising phenomenally across the world, attacking every industry sector possible and healthcare is one of the biggest targets. While the good...
Apr 18, 2019
Companies globally could incur USD 5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks, as dependency on complex internet-enabled business models outpaces...
Apr 17, 2019
The adoption of automation for IT security functions is on the rise across the US, UK and APAC, according to Poneman study. Overall, the findings demonstrate an increase in confidence in job security...
Apr 16, 2019
As organizations are working with newer technologies and geographically distributed teams today, they are looking to hire more contractors and remote workers without any strict requirements for...
Apr 05, 2019
The majority of attacks in 2018 were aimed at direct financial profit or obtaining sensitive information, according to PT Security’s Cybersecurity Threatscape 2018 Report. However, attacks aimed at...
Apr 03, 2019
A cyberattack can cost a large manufacturing organization in Asia Pacific an average of USD 10.7 million in economic loss with customer churn being the largest economic consequence of a cyber breach...
Apr 03, 2019
On March 6, 2019, the Federal Bureau of Investigation told Citrix that international cyber criminals gained access to its internal network. Resecurity, a security firm, has claimed that the attack...
Mar 11, 2019
As IT strategies become more closely aligned with business goals, the ability for security and risk management (SRM) leaders to effectively present security matters to key business decision makers...
Mar 06, 2019
Cybercriminals are constantly evolving the sophistication of their attacks—from continuing to exploit the vast insecurity of IoT devices, to morphing open source malware tools into new threats,...
Mar 05, 2019
By 2022, 70% of organizations using biometric authentication for workforce access will implement it via smartphone apps, regardless of the endpoint device being used, according to Gartner. In 2018,...
Feb 07, 2019
Its 5:48 a.m. — only 48 minutes into your 12-hour shift in the security operations center (SOC), and you’ve already investigated three threats. You were prepared for a long shift, but since an...
Feb 06, 2019
There is significant rise in the volume of new vulnerabilities in 2018, according to Skybox Security’s Vulnerability and Threat Trends Report. The National Vulnerability Database (NVD) assigned 16,...
Jan 30, 2019
37% organizations have been affected by cryptominers globally, followed by mobile malware (33%), botnet malware (18%), banking malware (13%) and ransomware (4%), according to Checkpoint’s Cyber...
Jan 29, 2019
India finds its place amongst the leading nations globally in their preparedness towards the General Data Protection Regulation (GDPR), according to Cisco’s 2019 Data Privacy Benchmark Study....
Jan 28, 2019
2018 has been another transformative time for security teams in APAC regions. The imposition of new regulations like Australia’s Notifiable Data Breaches scheme and the Indian government’s push to be...
Jan 23, 2019
Two cyber security risks—data fraud/theft and cyberattacks—have been identified as the most likely risks for 2019 by the World Economic Forum (WEF), in its recently released annual Global Risk Report...
Jan 21, 2019
In an unprecedented move, security software maker Gemalto withdrew its much-quoted bi-annual global Breach Level Index (BLI) report that it had released on 9th October and republished it on 22nd...
Oct 24, 2018
Adidas is in headlines for wrong reasons. No, not because two of the serious contenders decorated by it—Germany and Spain—failed to make it to the round of 16 in the ongoing world cup, while all the...
Jul 05, 2018
Facebook has admitted to sharing data with Huawei, Lenovo, OPPO and TCL—all Chinese phone makers. The confirmation came a day after The New York Times reported that Facebook provided access to users...
Jun 08, 2018
The conversation around enterprise security and threat management has always been horizontal. While there is a broader recognition today that the business impact of an incident could vary...
Apr 10, 2018
When it comes to increased cryptojacking activities, India is second in the Asia-Pacific and Japan (APJ) region and ninth globally as hackers create a highly-profitable, new revenue stream with...
Apr 04, 2018
There was a 25% decrease in the Distribution Denial of Service (DDoS) attacks in the fourth quarter of 2017 as compared to the third quarter, a new Verisign report revealed.Verisign found that the...
Mar 28, 2018
India's leading job portal, Naukri.com, has become the latest casualty to hacking. The news broke out when IT firm, Klaus, which manages the job portal's server logged a complaint with the CID Cyber...
Mar 27, 2018
The General Data Protection Regulation (GDPR) takes effect in May 2018 and will mandate that organizations have an incident response plan in place. At least 77% of respondents said in a new study...
Mar 23, 2018
A research by Gartner has indicated that nearly 20% of organizations have observed at least one IoT-based attack in the past three years. To protect against those threats, Gartner forecasts that...
Mar 21, 2018
Fortinet recently announced the addition of 11 industry-leading information technology providers to its Fabric-Ready Partner Program. These new partners further extend the Fortinet Security Fabric...
Mar 21, 2018
Digitally connected health devices such as pacemakers and MRI scanners in an Internet of Things (IoT) era can be fatal as hackers can exploit such devices and harm patients, the Royal Academy of...
Mar 16, 2018
Indian businesses are at a risk of repeated ransomware attacks and are vulnerable to exploits, according to Sophos’ India findings of its survey, The State of End-point Security Today. The survey...
Mar 15, 2018
The mainstreaming of cloud and the use of a disparate range of devices within businesses has led to nearly two-thirds of IT decision makers admitting that their security teams are considering...
Mar 15, 2018
The proliferation of cloud applications and use of a disparate range of devices within businesses has led to nearly two-thirds (64%) of IT leaders admitting that their security teams are considering...
Mar 09, 2018
Today organizations are spending a lot of money, time and efforts on Data Protection. It is crucially important for companies to meet customer expectations, maintain high level of productivity,...
Mar 05, 2018
Research firm Gartner advises security and risk management leaders to take a balanced approach to tackling a new class of vulnerabilities. Security researchers have revealed three major variants of...
Feb 15, 2018
The latest findings from the EY Global Forensic Data Analytics Survey indicates that regulatory compliance along with data protection and data privacy are two risks in sharp focus this year....
Jan 31, 2018
With less than six months to go before the most comprehensive personal data protection regime kicks in, Indian companies rush to comply with the new provisions. Looks like the IT/ITES and BFSI...
Jan 02, 2018
Intel India has trained 9,500 developers, students and professors across 90 organisations in the past six months in the emerging field of artificial intelligence (AI). Intel India has...
Oct 11, 2017
In the IT and security circles, Sunil Varkey, VP & Chief Information Security Officer at Wipro Limited, is a well-known name. A veteran in the field, Varkey has spent over 23 years of...
Oct 09, 2017
According to a Trend Micro report titled 2017 Midyear Security Roundup: The Cost of Compromise, the year 2017 has been nothing less than adventurous. The report suggests that WannaCry infected 300,...
Sep 21, 2017
The Uttar Pradesh Police has busted a state-wide network of fake Aadhaar card makers who used fake fingerprints of authorized Aadhaar operators to issue fake Aadhaar cards. According to the Special...
Sep 11, 2017