Forcepoint 2016 Global Threat Report: Evasion, Insider Threats, and Ransomware Advance; New “Jaku”… Abhishek Raval Apr 27, 2016 Annual report exposes threat campaign, examines shifts in attacker tools, tactics and processes
India needs regulatory standards on privacy and security of health records: Arvind Sivaramakrishnan,… Ankush Kumar Apr 26, 2016 Tele-health solutions can greatly enable healthcare access and delivery in the rural sector. Ensuring that the telecommunication…
Cyber criminals pose as ‘fake technical support’ to steal data: Report Rashi Varshney Apr 25, 2016 With close to 5 lakh attacks last year, India ranked 11 amongst countries targeted the most by tech support scams… The countries…
Worldwide IoT security spending to reach $348 million in 2016: Gartner Mohd Ujaley Apr 25, 2016 Worldwide spending on Internet of Things (IoT) security will reach $348 million in 2016, a 23.7% increase from 2015 spending of…
How Cisco looks to integrate security architecture in Digital India Mohd Ujaley Apr 18, 2016 American network technology giant Cisco is offering an integrated architectural approach to address the challenge of heterogeneity…
“IndusInd is one of the few banks to have adopted a Bimodal IT approach” Abhishek Raval Apr 6, 2016 The Bimodal IT approach enables the bank to concentrate both on running the lights on kind of operations but still keep working on…
Govt to push for bigger role in Net governance, says Ravi Shankar Prasad Express News Service Mar 16, 2016 The new governance model is being worked out through a global consultation process and efforts are underway to end direct US…
Artificial Intelligence will struggle to master a complex domain like security: Amit Yoran,… Srikanth RP Mar 7, 2016 In his opening keynote at the RSA Conference 2016, Amit Yoran, President, RSA, said that the industry has to tackle the threat of…
Goldmine remains for enterprise security, search for silver bullet continues Mohd Ujaley Feb 26, 2016 While corporations claim of robust security policies in place, the sustained ascendancy of cyber attacks is continuing to put most…
TCS Secures Critical Data With PIM Abhishek Raval Feb 19, 2016 TCS transitioned from manual systems for privileged user access and password management to Secured Access by implementing ARCOS, a…