Tag "security"

Akamai Fortifies Web Security Solutions Portfolio

by February 23, 2017

Akamai Technologies, Inc. unveils a new product, Web Application Protector, as well as added

Read More [shareaholic app="share_buttons" id="15671367"]

FireEye Announces Exploit Prevention and Anti-Virus Replacement for the Endpoint

by February 17, 2017

FireEye, the intelligence-led security company, announced several enhancements to its endpoint security solution designed to offer protection from threats missed by legacy and next-generation endpoint solutions. Utilizing the behavioral analysis …

Read More [shareaholic app="share_buttons" id="15671367"]

Symantec Security Solution for Next-Gen Cloud Services

by February 15, 2017

Enterprises are experiencing a fundamental shift in the way their employees and customers consume technology. The influx of personally-owned devices, ubiquitous high-speed internet, and cloud-based computing platforms is redefining the …

Read More [shareaholic app="share_buttons" id="15671367"]

Avaya Surge simplifies security at the perimeter of the Internet of Things

by February 15, 2017

Avaya announced a new solution that helps companies mitigate cyberattacks that can occur through IoT connected devices. A unique, security and management solution, Avaya Surge – formerly SDN Fx Healthcare …

Read More [shareaholic app="share_buttons" id="15671367"]

HP Inc Ropes in Actor Christian Slater to Increase Awareness on Enterprise Security

by February 14, 2017

HP Inc introduced the first of a series of global initiatives to elevate awareness of the security risks facing businesses and consumers. It kicks off with award-winning actor Christian Slater …

Read More [shareaholic app="share_buttons" id="15671367"]

SonicWall Report: Internet of Things Can Trigger Large-Scale DDoS Attacks

by February 9, 2017

Key Highlights:  ·         The volume of unique malware samples declined to 60 million, a 6.25 percent decrease. ·         Point-of-sale malware creation declined by 93 percent since 2014. ·         Secure Sockets Layer/Transport Layer Security …

Read More [shareaholic app="share_buttons" id="15671367"]

Intel Security: Connected Devices Lead to Challenged Relationships This Valentine

by February 8, 2017

Key Highlights ·         57% of Indians say that they have had to compete with their partners device for attention on a first date ·         60% of adults thought that their significant other …

Read More [shareaholic app="share_buttons" id="15671367"]

Content Injection Vulnerability in WordPress 4.7.0

by February 8, 2017

According to a blog on Sucuri, they discovered a severe content injection (privilege escalation) vulnerability affecting the REST API on WordPress. Here we present the details. This vulnerability allows an unauthenticated user to modify …

Read More [shareaholic app="share_buttons" id="15671367"]

Tenable Unveils SaaS Platform Redefining Vulnerability Management

by February 1, 2017

Tenable Network Security, Inc. Announces availability of Tenable.io; the industry’s first cloud-based vulnerability management platform to secure the full range of assets in the modern elastic IT environment. According to a …

Read More [shareaholic app="share_buttons" id="15671367"]

Cyber Security: A Major Focus For Government in Union Budget 2017

by February 1, 2017

  The finance minister, Mr Arun Jaitley, made a substantial announcement on enhancing the security of digital transactions and overall cyber security environment in India. Presented below are views from some …

Read More [shareaholic app="share_buttons" id="15671367"]

4 Top Technology Trends in Identity Technology for 2017

by January 18, 2017

  Stefan Widing, CEO &President, HID Global The four significant trends in 2017 that will influence how organizations create, manage and use trusted identities in a broad range of existing and new …

Read More [shareaholic app="share_buttons" id="15671367"]

Fingerprint and the Smart Phoney – A Gateway to Techie Thieves

by January 17, 2017

Fingerprint is the easiest way of securing your phone. No PINs required, no passwords or patterns to be remembered. It’s just the unique (not even identical twins share same fingerprints) …

Read More [shareaholic app="share_buttons" id="15671367"]

Cyber Security in 2017 – New Security Products, Variable Co-Sourcing, and More Automation

by January 10, 2017

In 2016, data breaches continued to take place across government, financial, healthcare, technology, education, retail, and other industries. A quick view of databreachlevelindex.com shows that daily on an average …

Read More [shareaholic app="share_buttons" id="15671367"]

The MADP Route to Transform Banking

by January 9, 2017

By S. Sundararajan, Managing Director, i-exceed Technology Solutions Happy customers and profitability are …

Read More [shareaholic app="share_buttons" id="15671367"]

8 Mobile Payment Solutions Free from Malware and Cyberattacks

by January 5, 2017

There are innovative mobile payment platforms, social peer-to-peer payment apps, digital wallets, payment apps for wearable devices, and alternative payment systems for mobile customers of which consumers and the merchants …

Read More [shareaholic app="share_buttons" id="15671367"]

No Hardware Level Security on Digital Payment Applications and Websites in India

by January 5, 2017

Recently, chipset maker company Qualcomm revealed that in India online banking, mobile banking and digital wallets applications and websites are not utilizing hardware level security that can led to serious …

Read More [shareaholic app="share_buttons" id="15671367"]

The Four Mega Trends Transforming Indian Payment Trajectory

by January 5, 2017

Over the last few years, digital transactions have shown speedy growth of 50 per cent Y-o-Y, followed by ATM transactions growing at 15 per cent. The branch-based transactions have almost …

Read More [shareaholic app="share_buttons" id="15671367"]

Scientists to Discard RFID Technology Used in Passports, Credit Cards from Being Hacked

by January 2, 2017

Scientists are trying hard to replace RFID technology used in passports, credit cards and online transactions from being hacked. Business Standard

Read More [shareaholic app="share_buttons" id="15671367"]

CMAI Urged PM for Domestic Manufacturing of PoS Machines to Tackle E-Frauds

by January 2, 2017

Post demonetization, a lot of transformation in Indian Business has been taking place. One of the most notable changes the common public has adopted pertains to shifting towards cashless economy …

Read More [shareaholic app="share_buttons" id="15671367"]

The Rise of Digital Wallets: Top Predictions for 2017

by January 2, 2017

To stay ahead of the rapid changes in payment technology, digital wallet firms need to understand who is driving these changes. As currency is disappearing from people’s wallet they are turning …

Read More [shareaholic app="share_buttons" id="15671367"]