Home Blog Page 206
An opinion poll from the Financial Services Information Sharing and Analysis Center (FS-ISAC) revealed that 75% of cybersecurity professionals in financial institutions across the globe made sudden changes to their firm's cybersecurity programs to deal with remote working conditions. The...
For most organizations undergoing digital transformation (DX), was already a challenging, complex, and costly journey, and it just got a dose of rocket fuel from COVID-19. The remote workforce has exploded in size seemingly overnight, networks are rapidly changing,...
According to Veracode’s annual report, 70% of mobile and desktop applications that are being used today have at least one security flaw which stems from the use of open-source library. The report, “State of Software Security,” revealed that lack...
According to the Kaspersky Security Network (KSN) report, India has witnessed a 37% surge in cyberattacks in  Q1 2020, as compared to  Q4 2019. Kaspersky stated that it detected around 52,820,874 cyberthreats affecting Indian organizations between January to March...
Samsung Electronics, known for its advancements in various turnkey technologies, has now introduced a standalone security solution comprised of a Secure Element (SE) chip (S3FV9RR) that is managed by enhanced security software. This security chip from Samsung offers a...
This might be a case of tasting one’s own medicine. Hackers turned against their own when they leaked databases from hacking forums. Researchers from security firm Cyble discovered database leaks of three hacking forums - Sinful Site, SUXX.TO, and...
A new eight-nation APAC study conducted by Boston Consulting Group (BCG) shows that spending on the public cloud and related services is growing, yet organizations aren’t confident about the security of cloud infrastructure and are holding back. The study...
CMMC stands for “Cybersecurity Maturity Model Certification.” But what it really means for your company, if you are one of the estimated 350,0000 contractors, manufacturers, and suppliers in the U.S. Department of Defense (DoD) supply chain, is a huge...
Researchers from security firm Cyble discovered a hacker group selling Wishbone.io database on darknet forums. The leaked database contained over 40 million records of Wishbone users–a social platform that allows users to compare social content via voting poll. According to...
Data Security Council of India (DSCI), today released the “India Cybersecurity Services Landscape – A Global Hub in the Making” report. It was launched by Ajay Sawhney, Secretary, Ministry of Electronics & Information Technology (MeitY) in the presence of...