Home Search

DDoS attacks - search results

If you're not happy with the results, please do another search
Spyware

Cloud Hopper hits several tech firms in Spyware attack

0
Security researchers stated that a global hacking campaign backed by China’s Ministry of State Security broke into various technology service providers to steal commercial...

Hillary Clinton to deliver a keynote speech at cyber defense summit

0
Former Secretary of State and Democratic presidential nominee Hillary Clinton is going to serve as a keynote speaker at the forthcoming  Cyber Defense Summit,...
Google Calendar

Cybercriminals use Google Calendar alerts to steal sensitive information

0
Scammers are making phishing attacks, by abusing Google Calendar services, to trick users into giving away sensitive information like passwords, card details, and other...
Acquisition

Israel’s Radware to acquire Indian-based startup ShieldSquare

0
Radware, a cybersecurity and application delivery solutions provider, recently announced that it’s going to acquire India-based bot management solutions provider ShieldSquare. The Israel-based company...
Abhinav Biswas

“No silver bullet to effectively mitigate emergent IoT threats”

0
Abhinav Biswas, the Alt. CISO for Electronics Corporation of India Limited (ECIL), Dept. of Atomic Energy, Govt. of India, has a wide range of agile...
Edureka data breach

Evolving from Human- to Machine-scale in Cybersecurity

0
Contributed by Ashley Fidler, Vice President of Product, Versive The cloud. Big data. BYOD. In this era where human-scale has given way to machine-scale, today’s cybersecurity...
SaaS

Building Regional PoPs to Improve SaaS App Performance? There’s a Better Way to Accelerate...

0
Contributed by Pejman Roshan, VP Product, Teridion The SaaS delivery model is now trusted by companies ranging from small startups to large global enterprises for their...
Cybersecurity Training

Keep your employees interested in cybersecurity awareness training with these tips

0
By Center for Internet Security As organizations work to make internal company processes and personnel more secure it’s worth asking, “Are we doing enough?” Rehashing...
Fintech

Fintech: Rooted in the Past, Borrowed from the Future

0
New innovations in financial technology tend to be discussed as if the financial industry is only now being impacted by technological innovation. The fact...
From Data Breach to Darknet

Demystifying Dark Web: An Organizational Point of View

0
This article featured in a CISO MAG’s edition. Contributed by Souti Dutta, Lead Threat Analyst - SOC Services, Paladion The Internet has become an “essential fixture” in...