Insights

Despite the increasing number of data breaches and nearly 36.6 million data records being lost or stolen in India in 2016, the vast majority of IT professionals still believe perimeter security is...
Jul 11, 2017
364
0
Between 2015 and now, there have been an alarming 53.6% rise in the number of records stolen across the globe, according to the first State of Cybersecurity Report, 2017 by Wipro. Data breaches once...
Jun 15, 2017
508
0
Gartner highlights the top technologies for information security and their implications for security organizations in 2017.  The top technologies for information security are: Cloud Workload...
Jun 14, 2017
553
0
91% of businesses in India say their organization is at risk because of the complexity of business and it operations, which is above the APJ average of 85% and the worldwide average of 83%, according...
Jun 08, 2017
519
0
Cyberattacks on the government sector doubled in 2016, rising to 14% from 7% of all cybersecurity attacks in 2015, according to the Executive’s Guide to the NTT Security 2017 Global Threat...
May 10, 2017
494
0
A few years ago, no one would have heard of headless worms, machine-to-machine attacks, denial of service and two-faced malware. Today the threat of cybersecurity just exceeds everything else there...
Apr 28, 2017
1,161
0
The spend on cyber security will significantly grow over the next five years, but will still not be able to keep pace with threats posed by data breaches, according to a new research on cyber...
Apr 28, 2017
682
0
Hacking used to require a distinct set of skills and capabilities. These days, attack services are bought and sold via marketplaces on the Clearnet and Darknet—a phenomenon that’s closing the gap...
Apr 28, 2017
675
0
Even insurance companies aren't insured against cyber attacks.   On 7th April 2017, the Insurance Regulatory and Development Authority of India (IRDAI) issued a circular to CEOs and CMDs of all...
Apr 18, 2017
896
0
With Industry 4.0 becoming a reality, operational infrastructure, which used a lot of electronic technology but were so far isolated from the rest of organizational IT, are now getting connected to...
Apr 07, 2017
394
0
Enterprise security is undergoing a dramatic change in 2017. According to research firm Gartner, organizations are moving away from prevention-only approaches to focus more on detection and response...
Mar 14, 2017
537
0
As consumer privacy becomes a major issue, more and more consumer technology companies are trying to encrypt user data. Law enforcement agencies complain that this is leading to a situation where...
Feb 10, 2016
2,886
0
Here is what ISACA presents as five trends in cybersecurity that are expected to surface in 2016 1. Cyber-extortion Will Hit Wearables, Medical Devices and Gaming Systems  B2B use of the Internet of...
Dec 29, 2015
1,367
0
Less number of software security vulnerabilities were reported worldwide in 2015, as compared to 2014. However, vulnerabilities with a high level of severity increased by almost 16%, according to an...
Dec 29, 2015
2,265
0
Where do Indian chief information security officers (CISOs) stand in the organizational structure? Who do they report to? What is their relationship with other functional departments, especially IT...
Nov 23, 2015
3,781
0
Interpol's Dr Madan Mohan Oberoi highlighted various aspects of global cybersecurity scenario   The 8th CSO Summit of CSO Forum started in Chandigarh today. Among the speakers were chief information...
Nov 20, 2015
57,929
0
Indian consumers affected by cybercrime lost on average 29.6 hours and INR 16,558, finds a new study by Norton. This is in comparison to an average of 21 hours and INR INR 23,878 (USD 358) across 17...
Nov 19, 2015
1,411
0
Even as businesses are warming up to the idea of enterprise app stores and Apple iOS is considered to be one of the safest systems from security standpoint, an attack on Apple’s AppStore now raises...
Sep 22, 2015
4,482
0
Enterprises may be struggling to digitally transform themselves, but extortionists seem to have learnt the trick. Digital extortion—in the form of what is called ransomware—is now a real threat. And...
Sep 09, 2015
4,458
0
The research conducted by the NopSec Labs finds following insights... Remediation challenges are creating major security risks: While rapid vulnerability detection is at an all-time high, it still...
Jun 12, 2015
12,375
0
The survey from Enterprise Strategy Group and Intel Security found that security professionals are inundated with security incidents, averaging 78 investigations per organization in the last year,...
Apr 30, 2015
1,515
0
Intel Security announced a technology platform that could secure both legacy and new capabilities within the electric power grid. The new solution, Intel Security Critical Infrastructure Protection (...
Apr 15, 2015
1,770
0
CIO have watched data security rise on their list of priorities as the number of sophisticated, targeted cyberattacks continue to escalate. To educate audiences who are tasked with thwarting attacks...
Apr 14, 2015
1,704
0
Research from Accenture and the Ponemon Institute shows that proactive strategies can improve and expand on value delivered to the business.  Of the nearly 240 companies surveyed as part of the...
Apr 14, 2015
1,605
0
What’ new in ‘enterprise security’ today and how are businesses tackling rising security challenges?The first emerging trend is the realization by companies that they are intermediaries under the...
Mar 23, 2015
1,291
0
Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex, modular tools, and keeping well under the radar of increasingly...
Mar 13, 2015
1,727
0
The internet is changing the way we do business in India. Faster internet connectivity considered a luxury some years ago is spreading fast. More and more users are connected over 3G and 4G and this...
Feb 02, 2015
1,807
0
After two years of testing in real-world deployments and at West Coast Labs, digital security vendor TrustPipe emerged from stealth mode today to introduce its marker-based security technology –...
Dec 03, 2014
2,245
0
The growing presence of online personal information and new methods of accessing and transferring medical data are increasingly putting sensitive protected data at risk, according to the health care...
Dec 03, 2014
1,144
0
“When it comes to cyber, clients are wary that they are studying to fight the last war,” said Bill Stewart, a Senior Vice President with Booz Allen who leads the firm’s work in the financial services...
Nov 28, 2014
1,827
0
What could possibly go wrong in hospitals? Many things, according to ECRI Institute, an independent nonprofit that researches the best approaches to improving patient care. Hazards caused by medical ...
Nov 27, 2014
763
0
The last few years have witnessed an explosion in data, giving way to several modern technologies and concepts that is making data more consumable and accessible. Big data analytics, mobility and...
Nov 10, 2014
630
0
The average consolidated total cost of a data breach increased 15 percent in the last year to $3.5 million, according to a study of 314 companies spanning 10 countries by Ponemon Institute. The study...
Sep 19, 2014
586
0
1. Outsource payment processing. Avoid handling card data on your own. Reputable vendors, whether it’s for Point-of-Sale or web payments, have dedicated security staff that can protect that data...
Sep 19, 2014
641
0
Device and data security will assume critical significance for companies adopting a bring you own device (BYOD) policy, especially with nearly 50 per cent of companies having reported lost mobile...
Sep 12, 2014
794
0
Home Depot's investigation of a suspected hacker attack is renewing pressure on retailers and credit-card providers to strengthen payment-system security.  The largest home-improvement chain said...
Sep 12, 2014
870
0
Cybersecurity is an emerging field within information security, as cybercrime continues to increase exponentially worldwide. Governments and institutions have launched many cybersecurity initiatives...
Sep 01, 2014
705
0
In new guidance issued today, global IT association ISACA outlines five principles organizations can use to effectively govern and manage their information and technology.  A new white paper offers...
Aug 29, 2014
640
0
The most common form of piracy is ‘end-user piracy’. End-user abuse occurs when you or your company uses one licensed copy to install a program on multiple computers or servers, when you copy disks...
Aug 16, 2014
515
0
Analysts find SMAC (Social Media Analytics and Cloud) all pervasive and invading the market place. Cloud is creating good footprints across enterprises and under various forms, whether private,...
Aug 13, 2014
1,054
0
Needless to say, enterprises are migrating varied applications to cloud which are posing a great security threat to the organisation; and this is giving sleepless nights to Chief Security Information...
Aug 07, 2014
685
0
Most security professionals across Indian enterprises echo a similar sentiment--that it is difficult to find trained and certified cyber forensic professionals in India. Most agree that fraud or any...
Jul 17, 2014
2,145
0
CI0s and senior IT decision makers have a clear mandate to lay down parameters to measure the return on investments on every technology that they deploy. And in line with the mandate, CISOs find it...
Jul 09, 2014
1,095
0
While there are certain things that are in the hands of enterprise information security practitioners, when it comes to securing their organizations, there are others he can’t do anything about....
Jun 27, 2014
672
0
1) Adequate Segregation of duties– establishing theright structure and RACI (Responsibility, Accountability, Consultation, and Informed) chart for each IT process and deploying ISO 27001-2013,...
Jun 20, 2014
907
0
Considerable discussion and debate has taken place about security and privacy, whether with regard to citizens’ rights, state surveillance, the Snowden affair or the Prizm program. However, the...
Jun 12, 2014
813
0
While enterprises invest in the best of security tools, be it Firewalls, Intrusion Prevention Systems (IPS) or Intrusion Detection Systems (IDS), etc., to protect their data from external hackers,...
Jun 12, 2014
821
0
Outlines best practices on APT security strategies and tactics.
Jun 02, 2014
481
0
Organisations should prepare themselves for the unknown so they have the flexibility to withstand unexpected and high impact security events. To take advantage of emerging trends in both technology...
Jun 02, 2014
651
0