Tag "security"

Secure Your Home with CP Plus Wireless Cube IP Camera

by April 22, 2015

Consisting of a 3.6 mm fixed lens and a 1 megapixel CMOS image sensor, the Cube IP Camera is capable of two-way audio and helps in increasing the security level …

Read More [shareaholic app="share_buttons" id="15671367"]

RSA Conference 2015 Study: 82% of Organizations Expect a Cyberattack

by April 17, 2015

According to a study by ISACA and RSA Conference, 82 percent of organizations expect to be attacked in 2015, but they are relying on a talent pool they view as …

Read More [shareaholic app="share_buttons" id="15671367"]

Handling Privacy and Security Concerns with Big Data

by March 27, 2015

Big Data and Analytics are a boon for gauging and improving customer experience but a bane for their privacy. Therefore, it’s critical how well organisations self-regulate to avoid breach of …

Read More [shareaholic app="share_buttons" id="15671367"]

Information Protection Lies at the Heart of Digital Transformation

by March 25, 2015

Digitization is creating new opportunities for organizations on one hand and on the other hand, it brings some serious threats in its wake. The increase in the number …

Read More [shareaholic app="share_buttons" id="15671367"]

Carrying Out Information Security Audits In BFSI

by March 24, 2015

In a world where investments, hedge funds, arbitrage pricing theory, uptick rule are part of daily vocabulary and the enhancement and sophistication of technology is gaining speed, financial …

Read More [shareaholic app="share_buttons" id="15671367"]

Combat Today’s Next Gen Attacks with Trend Micro’s New Mobile Security Suite

by March 11, 2015

With the number of mobile devices, including phones and tablets, rising from 7.7 billion in 2014 to more than 12.1 billion by 2018, users must be prepared for both platform …

Read More [shareaholic app="share_buttons" id="15671367"]

Super Secure Smartphones

by March 5, 2015

Everyone carries gigabytes of personal data with them on their smartphones and tablets. If this information falls in the wrong hands, it can be detrimental. It’s therefore essential to safeguard …

Read More [shareaholic app="share_buttons" id="15671367"]

Security vulnerabilities found in Indian overseas Bank App

by March 3, 2015

Appvigil, a cloud based android app security scanner discovered a JavaScript Injection vulnerability also known as cross-scripting or XSS vulnerability in the Indian Overseas Bank Android app. The …

Read More [shareaholic app="share_buttons" id="15671367"]

F-Secure Labs’ Report Cites Delhi as the Most Malware Hit City in 2014

by February 25, 2015

The detections from the ‘The state of Internet in India’ Report affirm the rise of malware infections in the country and states Delhi as the most infected city in 2014. …

Read More [shareaholic app="share_buttons" id="15671367"]

Implementing MDM Using MaaS360

by February 25, 2015

This MDM solution by Fiberlink aims to optimise the functionality and security of a mobile communications network while minimising downtime on an enterprise network MDM functionality typically …

Read More [shareaholic app="share_buttons" id="15671367"]

The Changing Face of Security in an SDDC

by February 16, 2015

Traditional security models depend on physical devices deployed on the perimeter of a private data center and are therefore blind to the …

Read More [shareaholic app="share_buttons" id="15671367"]

Dark Side of Your Living Room

by February 16, 2015

Popular connected home entertainment devices pose a real cyber security threat due to vulnerabilities in their software, and lack of …

Read More [shareaholic app="share_buttons" id="15671367"]

Implementing Network based Intrusion Detection with CISCO IOS

by February 4, 2015

By Chaynika Taneja, Sumit Goswami The IOS based IDS enables network administrators of small enterprises to build intrusion detection into the network without investing in a dedicated IDS entity

Read More [shareaholic app="share_buttons" id="15671367"]

New Products to Combat Cyberthreats Launched at HP Protect 2014

by November 3, 2014

The average cost of cybercrime has increased 78 percent in the last four years, putting the industry on the defensive against adversaries that attack with unmatched speed, innovation and collaboration. …

Read More [shareaholic app="share_buttons" id="15671367"]