Hot Products

Trend Micro launches security services platform for cloud builders

Trend Micro has announced the launch of Trend Micro Cloud One, a security services platform for organizations building applications in the cloud. Cloud One allows developers to rapidly build applications using the cloud services they want, while managing their organization’s risk. Cloud One delivers the industry’s broadest range of security capabilities in a single platform.

Tech Buzz

Enterprise Cloud Adoption Nearly Triples Single Sign-On Adoption

Bitglass has released “A for Adoption,” its 2019 Cloud Adoption Report. The study examines the rate of cloud adoption in more than 138,000 companies worldwide. The results indicate that 86% of enterprises have deployed cloud-based tools, but only 34% have implemented single sign-on (SSO), one of the most basic and critically important cloud security tools.

Power Play

PayPal pips Microsoft to become #1 impersonated brand in phishing attacks

Vade Secure has published its Phishers’ Favorites report for Q3 2019, which ranks the 25 most impersonated brands in phishing attacks. According to the report, PayPal has overtaken Microsoft to claim the number one ranking for the first time. Netflix was not far behind as the streaming giant moved up to the third spot with

Deep Dive

The State Of Web Application Security Report

70% of CISOs don’t have the final say over security choicesBy Nikhil TanejaManaging Director-India, SAARC & Middle East, Radware Organizations across the globe are constantly searching for more efficient ways to connect with customers, business partners, suppliers and staff. The ability to adapt quickly to changing market conditions with new and updated web applications is

Empowering the Infosec Community

By Nikhil Taneja Managing Director-India, SAARC & Middle East, Radware Despite the technological advancements, innovation, and experience the knights of the cyber order have acquired over the past 25 years or so, the “bad guys” are still a step ahead. Why? In large part, because of the power of community. While information security vendors live

Narayana Provides Affordable and High-Quality Healthcare using Analytics and AI

“How much will the surgery cost?” This is one question that has haunted Dr. Devi Shetty, Founder and Chairman of Narayana Health since he began his practice in 1983. Even today, more than three decades and over 15,000 surgeries later, he dreads the question from his patients. “As healthcare providers, it is important that we

Tenable’s Data Science Innovations Accelerate Vulnerability Prioritization and Remediation

Tenable has announced new Predictive Prioritization capabilities within Tenable.io and Tenable.sc, for vulnerability management in the cloud and on-premises, that accelerate the discovery, prioritization and remediation of vulnerabilities before they are published in the National Vulnerability Database (NVD). Depending on the issuing software vendor, a significant lag may exist between when a vulnerability is publicly

The State Of Web Application Security Report

70% of CISOs don’t have the final say over security choicesBy Nikhil TanejaManaging Director-India, SAARC & Middle East, Radware Organizations across the globe are constantly searching for more efficient ways to connect with customers, business partners, suppliers and staff. The ability to adapt quickly to changing market conditions with new and updated web applications is

Technology

Multi-Cloud Not an All-Or-Nothing Proposition for Applications

Always-on application experience (AX) provider Kemp has released its 2019 State of AX report. The report is a compilation of industry findings from ZK Research, with 200 respondents from the US and UK, as well as Forrester Consulting survey data of 150 IT and business leaders across five APAC markets. Among the findings, 66% of

IBM Delivers 100+ SAP S/4HANA Enterprise Transformations

IBM Services leads the way in helping clients accelerate modernization of enterprise systems, with more than 100 clients now live with SAP S/4 HANA IBM has announced it has completed more than 100 successful SAP S/4HANA implementations that are enabling companies to speed up their digital reinventions. As companies look to simplify increasingly complex business

Automation Anywhere acquires Paris-based Klevops

Company introduces new Attended Automation 2.0 Automation Anywhere has announced that it has acquired Klevops, a privately-held company based in Paris. With the acquisition, Automation Anywhere fast forwards the RPA category to Attended Automation 2.0, where managers can easily orchestrate workstreams across a team of employees and bots, driving a higher level of employee productivity

Multi-Cloud Not an All-Or-Nothing Proposition for Applications

Always-on application experience (AX) provider Kemp has released its 2019 State of AX report. The report is a compilation of industry findings from ZK Research, with 200 respondents from the US and UK, as well as Forrester Consulting survey data of 150 IT and business leaders across five APAC markets. Among the findings, 66% of

Security flaw leaves Android users subject to advanced SMS attacks

Researchers determined that certain Samsung phones are the most vulnerable to this form of phishing attack Check Point Research, the threat intelligence arm of Technologies Ltd., has revealed a security flaw in Samsung, Huawei, LG, Sony and other Android-based phones that leaves users vulnerable to advanced phishing attacks. The affected Android phones use over-the-air (OTA)

Cisco: IT Eager to Adopt AI, Intent-based Networking

The network is vital to today’s digital business. Whether maximizing employee productivity, optimizing customer experience or keeping data protected and secure, the network is foundational to business success. At the same time, the network is in the midst of one of its biggest evolutions since the introduction of the Internet, creating an opportunity for IT

Trends likely to impact cybersecurity in 2020

Cyberattackers are raising the stakes in ransomware, increasing stealth in malicious Android apps, exploiting misconfiguration in the cloud and abusing machine learning. These are the findings of the Sophos 2020 Threat Report that provide insights into the rapidly evolving cyberthreat landscape. The report explores changes in the threat landscape over the past 12 months, uncovering

CEO Vision

Three CEO concerns CIOs must address

Gartner has identified reglobalization, economic slowdown and ‘digital dithering’ as the top three concerns for CEOs in 2019. CIOs need to understand these concerns and address them in their strategic planning over the next 12-18 months. Kristian Steenstrup, distinguished analyst and Gartner Fellow, said that with business conditions declining, CEOs are looking for ways to

CFO Perspective

Data and Cyber-Related Risks Remain Top Worries for Audit Executives: Gartner

As organizations continue to collect customer and employee data, chief audit executives (CAEs) are increasingly concerned about how to govern and protect it, according to Gartner. According to Gartner’s annual Audit Plan Hot Spots Report, data governance has risen to the top spot of CAEs’ audit concerns, up from second place in last year’s report,

CISO Outlook

Ransomware remains the most common cyber threat to SMBs

Ransomware remains the most common cyber threat experienced by SMBs, according to a survey by Datto. The fourth annual Global State of the Channel Ransomware Report surveyed more than 1,400 MSP decision makers that manage the IT systems for small-to-medium-sized businesses (SMBs). While ransomware is used against businesses of all sizes, SMBs have become a

Top