Security

Most enterprise information security leaders are at a loss when it comes to next generation threats such as DDoS and APT. How big a threat are these for you and how do you mitigate them? We see just...
Mar 12, 2015
9,161
0
A vulnerability discovered recently could prove to be the final nail in SSL’s (Secure Socket Layer) coffin.  The latest vulnerability to hit SSL, called ‘Factoring attack on RSA-EXPORT Keys’ (or...
Mar 11, 2015
8,053
0
Established in 1863 in Kerala, Chemmanur International Group today has multiple branches across the globe. The company manages about 160 outlets (30 jewelry showrooms outside India, 115 NBFC branches...
Jan 27, 2015
8,455
0
Despite the increase in the attack surface of organizations, security is not accorded top priority. How is Blue Coat trying to make security a forethought rather than an afterthought? New and...
Jan 15, 2015
8,388
0
The government is embarking on a three-pronged initiative of setting up a National Cyber Coordination Centre (NCCC), strengthening its email system and establishing a botnet clearing center. These...
Dec 10, 2014
9,245
0
The leading provider of advanced threat protection Arbor Networks has announced latest addition to its Peakflow platform. With the new Peakflow 7.0, service providers can now detect fat flood...
Oct 27, 2014
7,978
0
These days whenever I ask CIOs about the biggest challenge confronting them, Shadow IT  invariably finds a mention. Shadow IT, which refers to information technology products/solutions that find...
Oct 21, 2014
8,988
0
The Canada based biometric products and solutions manufacturer, Invixium Access Inc has announced that it has expanded its distribution with Ingram Micro India Ltd, whereby Ingram will now distribute...
Oct 15, 2014
7,803
0
The real-time IT management firm ManageEngine has announced the addition of payment card industry data security standard (PCI DSS) 3.0 compliance reporting to EventLog Analyzer, its security...
Oct 15, 2014
7,882
0
Axis Communications has announced its latest Axis Q6000-E, an outdoor-ready 360° network camera that will integrate seamlessly with the Axis Q60-E Series of PTZ dome network cameras, providing a...
Oct 10, 2014
8,212
0
How can you measure the current risk level as far as cyber-threats are concerned in process industries?The security of automation solutions and networks has become a critical component of plant...
Aug 25, 2014
8,268
0
1.2 billion passwords reportedly stolen by Russian hackers. Before that it was Heartbleed. After a widespread, nonspecific data breach, the conventional wisdom is that people should change all their...
Aug 22, 2014
7,826
0
A Russian group has reportedly hacked 1.2 billion user names and passwords, belonging to over 500 million email addresses, according to a report by Hold Security. The firm claims that the information...
Aug 07, 2014
7,951
0
DDoS has become the primary threat to the availability of enterprise networks. DDoS was once a basic high volume attack that flooded the pipes of its targets. The modern DDoS threat is a complex...
Jul 15, 2014
7,733
0
DDoS attacks against customers remain the number one operational threat seen by respondents during the survey period, with DDoS attacks against infrastructure being the top concern for 2014. This...
Jul 15, 2014
7,747
0
Motorists can no longer ignore safety concerns about the communications and Internet services included in the new generation of "connected cars". This is much more than just helping to park your car...
Jul 09, 2014
7,939
0
Juniper Networks has introduced new enhancements to its SRX Series Services Gateways that claims to provide next-generation security. The new enhancements aim to help customers protect against...
Jun 26, 2014
7,928
0
EMC India has released the India and global findings of the EMC Privacy Index, a global study assessing consumer attitudes of online privacy. Spanning 15 countries and 15,000 consumers, the study...
Jun 20, 2014
7,911
0
Most CISOs across India pay more attention towards securing their organisation from external threats, however, over the years, reports have continued to reveal that the first-point of breach or data...
Jun 18, 2014
8,218
0
Akamai Technologies has revealed that Fortune 500 enterprises are vulnerable to a high-risk threat of continued breaches from the Zeus framework. Malicious actors may use the Zeus crimeware kit to...
Jun 11, 2014
8,038
0
Increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies, according to Gartner, Inc. Gartner...
Jun 09, 2014
8,131
0
Kaspersky Lab has launched a free app for Facebook called FriendOrFoe that allows users to assess just how “valuable” their friends are, and even shows what others think of them. The app will reveal...
May 21, 2014
7,827
0
Fortinet has unveiled a major update to the company’s FortiOS network security operating system that powers the FortiGate platform. This release incorporates numerous innovations that strengthen...
May 14, 2014
7,834
0
The threat landscape has seen a proliferation of highly targeted zero-day attacks and APTs that are designed to steal intellectual property or other critical enterprise data. Researchers at Fortinet’...
May 14, 2014
7,853
0
Blue Coat Systems has announced that its SSL Visibility Appliance delivers automatic protection against attacks exploiting the Heartbleed vulnerability. By automatically detecting, blocking and...
Apr 30, 2014
7,808
0
Kaspersky Lab’s heuristic detection protection subsystem has successfully blocked attacks via a zero-day vulnerability in Adobe Flash software. Kaspersky Lab researchers discovered this loophole,...
Apr 29, 2014
7,858
0
It is all pervasive that the Heartbleed bug is a vulnerability discovered in the TLS heartbeat mechanism built into certain versions of the popular OpenSSL library. OpenSSL is one of the technologies...
Apr 29, 2014
7,793
0
In December Kaspersky Lab published its threat forecast for 2014. Three months later, the experts found that all three of their ‘End user forecasts’ had already been confirmed.    They said that...
Apr 24, 2014
7,807
0
Verizon security researchers, using advanced analytical techniques, have found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine basic attack...
Apr 24, 2014
7,833
0
Symantec’s latest Internet Security Threat Report (ISTR), shows a significant shift in cybercriminal behavior, revealing the bad guys are plotting for months before pulling off huge heists – instead...
Apr 24, 2014
7,720
0
What are the new generation threats and risks arising out of the various technology trends? Of these, which spell sleepless nights for CISOs? There are a couple emerging out of the various technology...
Apr 22, 2014
7,786
0
CISOs need to look at solutions which will identify, contain, respond, remediate and ultimately mitigate the impact of the breach, faster and more efficiently. Download this report to know more....
Apr 17, 2014
7,863
0
While enterprises invest in the best of security tools, be it Firewalls, Intrusion Prevention Systems (IPS) or Intrusion Detection Systems (IDS), etc., to protect their data from external hackers,...
Apr 09, 2014
8,142
0
Virat Bhatia, the President (External Affairs) of AT&T for South Asia, has been revealed to be one of the members of an Indian government panel on cybersecurity and Internet policy. The Permanent...
Apr 08, 2014
7,938
0
Organizations are increasingly adopting a model in which multiple access control use cases and identities can be supported on one card or smartphone. This convergence of use cases and identities...
Apr 07, 2014
7,690
0
Fortinet has announced that its FortiGate security platform is now available on Amazon Web Services (AWS). FortiGate-VM is strategically designed to help customers better mitigate potential blind...
Apr 03, 2014
8,052
0
Do verticals like banking, insurance which is most vulnerable to attacks need to avoid complacency and leverage new mitigation tools to ensure protection against any DDoS attack? Yes, DDoS attacks...
Apr 03, 2014
8,953
0
To all CIOs and CISOs of India, how do you define AET? Is it similar to Advanced Persistent Threats (APT)? If the answers to the above questions are NO and YES respectively, then you add to the list...
Apr 03, 2014
7,863
0
Microsoft is expected to pull off support for Windows XP systems on April 8th, and many companies are yet to finalize a migration strategy to a newer operating system. According to estimates, 16...
Apr 02, 2014
7,881
0
BlackBerry has announced that Secure Work Space for iOS and Android, a multi-platform containerization solution managed through BlackBerry Enterprise Service 10 (BES10), is now Federal Information...
Apr 02, 2014
7,814
0
SUSE has released kGraft to the public, the technology it developed to deliver live, run-time patching of the Linux kernel. Unlike other technologies, kGraft doesn't require stopping the kernel even...
Mar 28, 2014
7,831
0
Secure network connectivity has always been an area of concern for enterprise technology decision makers and providing the right security implementation is key to this. There are three major...
Mar 24, 2014
7,851
0
Kaspersky Lab has announced that its latest Maintenance Pack (MP1) for Kaspersky Security for Linux Mail Server is now publicly available for installation. This new suite of enhancements includes...
Mar 21, 2014
7,881
0
Arbor Networks, a provider of DDoS and advanced threat protection solutions for enterprise and service provider networks, has announced the results of a survey it sponsored with the Economist...
Mar 20, 2014
7,914
0
RBI has notified all scheduled commercial banks in India to take immediate steps to avoid any sort of cyber attacks in the absence of Microsoft's support for Windows XP from 8 April 2014. “As some of...
Mar 20, 2014
7,706
0
Cybercriminals today are organised, sophisticated and have powerful resources at their fingertips. In most cases, attacks are initiated with specific targets and objectives in mind. The aim is to...
Mar 18, 2014
9,054
0