Is Your Cloud Security Model Effective Enough?
The movement to cloud often creates its own infrastructure management challenges. And in the case of security, it can lead to less than ideal architectures for managing the growing array…
The movement to cloud often creates its own infrastructure management challenges. And in the case of security, it can lead to less than ideal architectures for managing the growing array…
A new report from Accenture warns that businesses’ use of personal data from consumers is at risk and recommends key strategies and principles to properly protect consumer data, build trust…
You are driving down the road and your smartphone or vehicle alert system announces that black ice is 1.5 miles ahead. As you move closer there’s a countdown: 500 feet,…
After five months, Microsoft’s Windows 10 powers about 164 million PCs, data published Friday showed. Windows 10’s user share an estimate of the portion of all personal computers worldwide that ran…
Increasing use of banking apps on smartphone are set to cause nightmare to consumers and financial institution as per the predictions for 2016 by Trend Micro. Reports say that 3 in…
Almost half of us undermine our online security by sharing passwords, according to findings by software security group, Kaspersky Lab. The findings of Kaspersky Lab’s recent consumer surveys showed 44…
Cisco Systems has launched an internal code review following Juniper’s disclosure last week of unauthorized spying code found in its enterprise firewall products. So far, “we have no indication of…
Commvault announced the opening of a new research and development centre in Bangalore. The facility which is situated in the heart of technology innovation in India, Bagmane Tech Park, CV…
The Kaspersky Security Bulletin Overall Statistics Report for 2015 highlights a new trend for the first time ever. Mobile financial threats rank among the top ten malicious programs designed to steal…
Sophos has released its global cybersecurity predictions for 2016 , which discusses the nature of evolving threats vis-à-vis rising complexity in securing the cyber space. These predictions indicate that as advanced attacks get more…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More