Home Search
DDoS attacks - search results
If you're not happy with the results, please do another search
Cloud Hopper hits several tech firms in Spyware attack
Security researchers stated that a global hacking campaign backed by China’s Ministry of State Security broke into various technology service providers to steal commercial...
Hillary Clinton to deliver a keynote speech at cyber defense summit
Former Secretary of State and Democratic presidential nominee Hillary Clinton is going to serve as a keynote speaker at the forthcoming Cyber Defense Summit,...
Cybercriminals use Google Calendar alerts to steal sensitive information
Scammers are making phishing attacks, by abusing Google Calendar services, to trick users into giving away sensitive information like passwords, card details, and other...
Israel’s Radware to acquire Indian-based startup ShieldSquare
Radware, a cybersecurity and application delivery solutions provider, recently announced that it’s going to acquire India-based bot management solutions provider ShieldSquare. The Israel-based company...
“No silver bullet to effectively mitigate emergent IoT threats”
Abhinav Biswas, the Alt. CISO for Electronics Corporation of India Limited (ECIL), Dept. of Atomic Energy, Govt. of India, has a wide range of agile...
Evolving from Human- to Machine-scale in Cybersecurity
Contributed by Ashley Fidler, Vice President of Product, Versive
The cloud. Big data. BYOD. In this era where human-scale has given way to machine-scale, today’s cybersecurity...
Building Regional PoPs to Improve SaaS App Performance? There’s a Better Way to Accelerate...
Contributed by Pejman Roshan, VP Product, Teridion
The SaaS delivery model is now trusted by companies ranging from small startups to large global enterprises for their...
Keep your employees interested in cybersecurity awareness training with these tips
By Center for Internet Security
As organizations work to make internal company processes and personnel more secure it’s worth asking, “Are we doing enough?” Rehashing...
Fintech: Rooted in the Past, Borrowed from the Future
New innovations in financial technology tend to be discussed as if the financial industry is only now being impacted by technological innovation. The fact...
Demystifying Dark Web: An Organizational Point of View
This article featured in a CISO MAG’s edition.
Contributed by Souti Dutta, Lead Threat Analyst - SOC Services, Paladion
The Internet has become an “essential fixture” in...