The software maker said that its cybercrime investigation group took legal and technical actions to fight notorious criminals who infect computers with Zeus.
Alpna Doshi, CIO - Reliance Communications, opines that channel partners, vendors and customers should also be considered while designing the information security of the company.
A triple combo of protective software to foolproof computers against various security threats
Virtualised applications on the network support scalability and performance increases
Cyber security analysts said that they expect hacktivism to continue, though it may not be as severe.
Experts from Kaspersky Lab uncovered the hidden attack, which exploited a vulnerability in the teasers used by a number of popular Russian news sources.
Symantec and Ponemon Institute release findings of the 'Cost of Data Breach' study.
Carl Leonard, Senior Security Research Manager (EMEA), Websense Security Labs, talks about the trend of social spear phishing and how enterprise can safeguard themselves.
The quadrant is based on an assessment of a company's ability to execute and completeness of vision.
There is at least a perceived security risk in each of these. But how real is it?
However, the minister also said that the number of internet frauds involving Rs.1 lakh and above have declined over the last three years.
Dell to buy the network security products maker as it tries to tap growing demand for corporate network protection.
Compliance has been driving risk management at enterprises but more recently, it is being seen as a contributor to the bottomline.
CEOs, whose companies have been hacked, speak up on fighting the constant battle against security threats.
More formidable security threats and high-profile attacks drive enterprise demand.
Features protection for Teradata databases, database audit plug-in for MySQL and ability to manage database security outside of its own silo.
Announces Sentinel 7, the Security Information and Event Management solution.
EMC's RSA security division helps enterprises embrace mobility and BYOD strategies without sacrificing security and usability.
Combines web security, data security, malicious app and mobile malware protection, with MDM features.
Mobile devices help business, but 59% of employees dodge security controls.
Sachin Jain, CIO and CISO, Evalueserve provides his recommendations on 'Dos' and 'Don'ts' for vendor contracts and SLAs when moving to the cloud.
New solutions deliver enterprise visibility with context to reduce business risk across traditional, mobile and cloud environments.
75% cos with BCM programs will have public social media services in their crisis communications strategies by 2015.
RSA and Carnegie Mellon CyLab research surveyed Forbes Global 2000 list of CEOs, CFOs, CROs and board members of governance practices.
Satish Warrier, CISO, Godrej Industries talks about the importance of creating awareness among employees to prevent loss of confidential data
Experts uncover flaw that they say hackers can exploit to gain control of the devices.
More than half of workers don't always follow or are unaware of their company's security policies, says Xerox and McAfee survey.
Customers can now use Check Point Software blades with a virtual appliance in the cloud.
IBM to tap security analytics and threat intelligence from more than 400 sources, including the X-Force Threat Feed.