Articles for Security

Imperva Researchers Go Undercover to Study Tactics of Phishing Hackers

Study reveals typical account takeover time, most sought after data, as well as lazy habits of attackers

Read More
RBL Bank Hosts Grand Finale of Hackathon

One of the finalists may get an opportunity to co-develop a proof of concept with Infosys Finacle and the potential opportunity to work with RBL Bank

Read More
CEOs Responsible for Data Breaches: Cyber Security Professionals

Whose neck is most on the line if a company has a data breach?

Read More
Devil's Ivy Vulnerability Affecting Millions of IoT Devices

Millions of products are vulnerable to a flaw that allows attackers to remotely gain control over devices or crash them

Read More
Cisco Predicts New 'Destruction of Service' Attacks; Scale and Impact of Threats Grow

Key industries need to improve security posture as information technology and operational technology converge

Read More
WISeKey Unveils Citizen Digital Identity Platform

Under the Microsoft CityNext initiative to bring innovation and security to smart cities

Read More
FireMon Risk Analyzer Bridges Gap Between Enterprise Risk and Network Teams

Patented technology simulates cyberattacks, helping companies reduce the time to prioritize risk and refine firewall policies by 90 percent

Read More
UK Business to Spend Over £1m Recovering From Data Security Breach: NTT

NTT Security estimates that companies will take 80 days to recover and suffer a 9.5 percent revenue drop

Read More

Stay in the know with our newsletter