Most organizations have a centralized IT department with the apps and software approved for certain activities. However, remote workers might choose to find other apps and software that lacks the perceived limitations of the centralized and approved IT resources....
ICS (Industrial Control System) or SCADA have faced large volumes of attacks from notorious threat actors in the recent past. Be it the China-linked group RedEcho targeting the Indian power sector or an unidentified cybercriminal attempting to poison Florida...
Threat actors often leverage fleeceware or fake apps to drop malware on consumers’ devices. Usually, cybercriminals use these kinds of apps to break into users’ devices and obtain access to sensitive financial data. Google promptly removes such fraudulent apps...
The Netherlands Data Protection Authority slammed Booking.com with a €475,000 fine (around $560,860) for a data breach that exposed sensitive information of over 4,109 customers. The Dutch data privacy watchdog claimed that Booking.com delayed reporting about the incident. Booking.com is...
Application security is a complex topic, which software developers and even security professionals are trying to understand today. There was a need for a book to simplify the topic and all the jargon.
With this in mind, bestselling author Ted...
To beat hackers at their own game, you need to think like them. They’re going to probe your software systems to find security vulnerabilities; you need to do this too.
But…how?
If you're like most people, you struggle to understand how...
The increasing ransomware attacks have become a severe issue for all nations globally. From the health care sector to information technology, ransomware attacks continue to loom over cyberspace. Threat actors target organizations by encrypting their critical networks and demanding...
Days after the MobiKwik data breach incident, wherein, 3.5 million MobiKwik users’ KYC details were allegedly leaked, another major data leak event concerning Facebook seems to have hit the Indian shores along with 106 other countries. Alon Gal, CTO...
Bharti Airtel, a popular telecommunications provider in India, has been selected by the Indian Computer Emergency Response Team (CERT-IN) to offer its cybersecurity solutions to government organizations and corporate consumers. CERT-IN is India’s National Incident Response Center for cybersecurity...
Jon Green is VP and Chief Security Technologist at Aruba, a Hewlett Packard Enterprise Company. He is responsible for providing technology guidance and leadership for all security solutions including authentication and network access control, UEBA, encryption, firewall, and VPN....














