By Harish Kumar, Head, Enterprise & Government, Check Point Software Technologies, India & SAARC If the past year has taught businesses anything, it’s that the impact of targeted cyberattacks and…
cyberattacks
-
-
The growing need to manage privileged access reflects the enormity of cybersecurity measures
by CIO AXISBy Rajarshi Bhattacharyya, Chairman and Managing Director, ProcessIT Global Soaring security incidents across industries are mainly due to unauthorised access by cybercriminals to the business organisation’s network, data, applications or devices.…
-
-
According to a survey conducted by Local Circles, 41% of citizens whose personal data was compromised believe it was done by their telecom or banking service providers, as the majority…
-
Microsoft has warned of emerging cyber risks such as ‘ice phishing’ campaigns that can leave the so-called safe decentralised, De-Fi world of finance at the whim of hackers as the…
-
Threat actors are actively exploiting new vulnerabilities of Microsoft, Oracle, Apache, and Apple, according to the US Cybersecurity and Infrastructure Security Agency (CISA). Based on information that threat actors are…
-
IBM has unveiled IBM FlashSystem Cyber Vault to help companies better detect and recover quickly from ransomware and other cyberattacks. The company also announced new FlashSystem storage models, based on…
-