Threat correlation and visibility creates effective means to render cybercrime profitless Trend Micro has released key ways to identify and disrupt criminal market operations to conclude a three-part report series…
Security
-
-
Internet of Things (IoT), 5G, artificial intelligence (AI), augmented reality (AR), blockchain, automation, cybersecurity and cloud computing were identified as technologies that would play a critical role in keeping operations…
-
Cybersecurity solutions provider Check Point Software Technologies has published its new Brand Phishing Report for Q3 2020. The report highlights the brands which were most frequently imitated by criminals in…
-
73% of Indian companies reported over 25% jump in cyber threats while working from home: Cisco
by CIO AXISOrganizations in India are seeing a significant increase in the cybersecurity challenges they face amid the shift to mass remote working, a new study by Cisco shows. According to the…
-
-
Tenable Advises Enterprises to Patch RCE Windows Codecs and Visual Studio Code Vulnerabilities
by CIO AXISOn Friday, the US’ CISA issued an advisory for two Microsoft vulnerabilities not addressed in last week’s Patch Tuesday update. Rody Quinlan, Security Response Manager at Tenable has offered the…
-
Organizations are never the same after being hit by ransomware. In particular, the confidence of IT managers and their approach to battling cyberattacks differ significantly depending on whether or not…
-
IBM Security has announced new and upcoming capabilities for Cloud Pak for Security, including a first of its kind data security solution that allows companies to detect, respond to and…
