Tom Scholtz, VP Distinguished Analyst, Gartner explains how even the best of companies tend to miss out on certain aspects of security or they are just not up to satisfactory levels.
Indian economy is facing a tough time. Amidst such an unstable scenario, a serious cyber breach/attack can dent a company's balance sheet and image in a not-so-good way.
Companies must refocus privacy efforts to deal with the impact of the Nexus of Forces.
Despite the increasing prevalence of virtual and SaaS-based solutions, appliances remain the predominant delivery method for network security products, finds IDC.
The threat of insider fraud is a growing risk that can result in tangible financial loss to businesses, finds survey.
Companies assign their own Tech Support Department to train company employees in matters of IT security, rather than hiring outside IT consultants or security professionals.
It will enable India to test IT and electronics products and issue certificates, which will be acceptable internationally.
Hackers gearing up for a contest to crack the device's first-ever fingerprint scanner, a high-tech feature that Apple says makes users' data more secure.
CA Technologies has been named a "Leader" in "The Forrester Wave: Identity and Access Management Suites, Q3 2013."
New offerings disrupt adversaries, manage risk and extend organisations' security capabilities.
Frost & Sullivan's survey of IT managers revealed that only 31% of the respondents claimed their organisations are prepared to handle outages and disasters.
Microsoft released the software as an emergency measure to protect customers after learning about "extremely limited, targeted attacks" that made use of the newly discovered bug.
Maria Bellarmine, CISO, Head - Infosec Group, Tech Mahindra Ltd. talks about making security awareness part of employees' KPIs ensuring it's not only an IT driven initiative.
Sasi Murthy, Head, Security Products & Solutions, Blue Coat talks about key dynamics, especially cloud, changing the InfoSec landscape today in India and factors to consider for a agile security program.
Websense continues its Java security research series by analysing other plug-ins, browser extensions and rich internet applications that are commonly exploited.
Analysis showed that this Trojan {also known as the Hand of Thief) is equipped not only with a wide array malicious features but also can conceal itself from anti-viruses.
Sophos announced an update for customers to manage the new business-focused features of Apple's latest version from the Sophos web-based console.
Ian Yip, Identity, Security & Governance Product Manager, APAC, NetIQ says that instead of changing security policies for the cloud, minimise information risk by carefully selecting what goes on the cloud.
Banking malware jumps from PC to mobile platform, finds Trend Micro Q2 2013 Security Threat Round Up report.
Gartner says compliance is an outcome of a well-run risk management program and should not dominate CIOs' decision-making.
It's the need of the hour given the decreasing effectiveness of signature-based approaches to protect us from advanced targeted attacks and advanced persistent threats.
Kaspersky Lab has been ranked third largest vendor in the worldwide Corporate Endpoint Security Suite market by IDC's report.
For the first time in the history of mobile cybercrime, a Trojan is being spread using botnets controlled by other criminal groups.
To quadruple the capacity to Scale web-based cyber attack protection.
Ashish Pachory, CIO - Tata Teleservices elaborates on the rationale and the functioning of its Security Operation Centre.
As per the survey only 40% of smartphone and 42% of tablet owners stated that they have installed a security solution on their devices and are now using it.
This mobile-based solution provides a secure mobile two-factor one-time-password (2FA OTP) authentication system.
Sophos Server Protection offers flexible cross-platform antivirus for virtual and physical servers.
The XCS 880 protects against inbound threats such as virus, blended threats and network attacks, while helping control outbound information to prevent data loss.
Second quarter report warns of SMS-stealing banking malware, fraudulent dating apps, and data-stealing apps.