Tag "Cyber Attacks"

5 cyber safety tips for women

by March 8, 2019

There is less doubt that women are more social, expressive and vocal as compared to men and what better means to enjoy such freedom of expression than the social media. …

Read More [shareaholic app="share_buttons" id="15671367"]

37% of Organizations Impacted by Cryptomining over Past Year, shows Check Point’s 2019 Security Report

by January 25, 2019

 Check Point Software Technologies Ltd. has published the first instalment of its 2019 Security Report.  The Report highlights the main tactics cyber-criminals are using to attack organizations worldwide …

Read More [shareaholic app="share_buttons" id="15671367"]

EY strengthens its collaboration with IBM with the launch of next-gen SOCs

by January 9, 2019

EY strengthened its collaboration with IBM with the launch of advanced Security Operations Centre (SOCs) as part of its Managed Services offerings in India. Equipped with leading-edge NextGen …

Read More [shareaholic app="share_buttons" id="15671367"]

BlackBerry Launches New Ransomware Recovery Solution

by August 8, 2018

BlackBerry Limited announced its next-generation BlackBerry Workspaces content collaboration platform, featuring a new ransomware recovery capability that allows organizations to quickly recover from cyber attacks. Despite even …

Read More [shareaholic app="share_buttons" id="15671367"]

Top Five Security Products for SMEs

by June 15, 2018

The small and medium sized enterprises have not escaped the prowling eyes of cyber criminals. While there is comfort in choosing to believe that cyber criminals would only …

Read More [shareaholic app="share_buttons" id="15671367"]

Delphi Infotech Introduces Mimecast to customers and partners in India

by May 1, 2018

Delphi Infotech Private Limited successfully completed its Mimecast introduction in India. The event witnessed the presence of prominent CIOs- Pradeep Wason- Chief Manager of Bennet Coleman & Company Ltd., A P …

Read More [shareaholic app="share_buttons" id="15671367"]

Gemalto to protect 5G next generation networks from cyber-attacks with Intel Software Guard Extensions

by April 20, 2018

Gemalto announced it is bolstering protection against cyber-attacks for the new generation of cloud-based virtualized networks being planned and deployed with Intel technology. This new initiative combines the Intel …

Read More [shareaholic app="share_buttons" id="15671367"]

Mathivanan V, ManageEngine: Cyber attacks aren’t likely to slow down in 2018

by April 9, 2018

Cloud computing makes data omnipresent. Thus, the pervasiveness of data requires protection and security; cloud security plays a paramount role here. In the present day scenario, cloud security has to face …

Read More [shareaholic app="share_buttons" id="15671367"]

F-Secure Introduces Unique Partner-Driven Service to Stop Targeted Cyber Attacks Globally

by March 7, 2018

Businesses globally are being compromised by an onslaught of targeted and fileless cyber attacks, and industry-leading cybersecurity vendor F-Secure is answering the demand for new types of services to combat …

Read More [shareaholic app="share_buttons" id="15671367"]

How Predictive Intelligence is useful in Crime Prevention

by July 14, 2017

By Tarun Wig, Co-Founder, Innefu Labs When technology reaches into the wrong hands, they misuse it to terrify the world. Nations cannot stop the flow of information, they are …

Read More [shareaholic app="share_buttons" id="15671367"]

Millennials Are Most Risk Prone To Cyber Security Threats

by March 7, 2017

  By Surendra Singh, Country Director, Forcepoint Alistair Maclean, the author of several thrillers, wrote a page-turner way back in the sixties, called the `Fear is the Key’. It is a tale …

Read More [shareaholic app="share_buttons" id="15671367"]

Cybersecurity Report Finds Wide Majority of Organizations have been Victimized by Cyber Attacks

by August 31, 2016

A surprising outcome of the growing use of encryption technology is an increase in cyber attacks, according to a new report from A10 Networks. Conducted in partnership with Ponemon Institute, …

Read More [shareaholic app="share_buttons" id="15671367"]