Report released by FireEye highlights theresurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release-attacking.
As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly.
A computer virus widely used to steal credit card data, known as Zeus, has been modified to create bogus Instagram "likes" that can be used to generate buzz for a company or individual.
Venkatesh Swaminathan, Country Manager, The Attachmate Group, talks about the significance of cloud and BYOD in shaping the security landscape.
Traditional platform vendors are coming under pressure from a new generation of cloud-based specialists that are changing the way that IAM services will be consumed in the future.
Trusteer is a company that helps businesses fight computer viruses and fraud.
Managing vulnerabilities and threats tops the list of IT security priorities for security decision-makers with 90 percent of enterprises saying it is a high or critical priority.
Gartner believes that high consumer use of personal mobile devices for work purposes means security providers have an opportunity to assist enterprise BYOD initiatives.
Gartner believes that high consumer use of personal mobile devices for work purposes means security providers have an opportunity to assist enterprise BYOD initiatives.
Small businesses are attractive targets themselves and a way in to ultimately reach larger companies via "watering hole" techniques.
Employee error is one of the main causes of internal IT security incidents which lead to the leakage of confidential corporate data, finds Kaspersky Lab.
Alliance delivers IAM-as-a-Service hosted locally, in-country to help address data sovereignty needs.
The bank recently launched its online corporate banking solution and ensures safe transactions with VASCO's strong authentication solution.
New guide provides sample SLAs, case studies and mappings.
Library of more than 200 predefined, multi-country rules proactively protect personal, financial and healthcare data.
Frost & Sullivan analyses the risks for data breaches and theft in the contact centre, and helps contact centre managers understand the actions that can be taken to increase agent vigilance and data security.
This intrinsic two-way feature is available to both versions of the SecPoint Protector.
As cyber attacks increase in volume and severity, QRadar Vulnerability Manager helps identify, sort, contextualise and prioritise network vulnerabilities.
Spread of bot infections in more Indian cities: more phishing and virus-bearing emails target small Indian businesses.
The current update includes 17 standards that were restructured to include the definition of key terms, provide additional clarity and align with other global auditing bodies.
Each of the vulnerabilities uncovered by FireEye was exploited by advanced attacks across a number of applications, including Microsoft Internet Explorer, Adobe Flash, PDFs, Oracle and Java.
Unifies threat intelligence, Big Data security analytics and security visibility to protect against zero-day, advance persistent, web and email threats, spear phishing attacks and malicious files and botnets.
Analysts say this deal should spark more acquisitions in the industry as large vendors seek to profit from growing demand for IT security.
The possible misuse of citizen data, containing PANs and biometric information, has raised question marks around trusting UIDAI'S IT infrastructure with the data of a billion.
Employees are the backbone of an organisation, but they're also the biggest risk to the very data that makes a business thrive, finds study.
Global distribution agreement provides businesses with new high-speed data encryption technologies.
The cyber protection of critical infrastructure has become the most immediate primary concern for nation states, finds ABI Research.
New high performance, high capacity appliance enables consolidation of large branch offices and large data sets.
Around half of the world's securities exchanges were the target of cyber-attacks last year, according to a paper based on a survey of 46 exchanges.
Guriq Sedha, Research Director, Gartner shares his view on IT procurement in India. He also touches upon some of the gaps on today's IT governance policies.