Latest Articles in Security

Web Applications Are The Most Common Breach Targets: David Holmes, Principal Threat Research Evangelist, F5 Networks

David Holmes, Principal Threat Research Evangelist, F5 Networks in conversation with Sarabjeet Kaur, BW CIOWORLD, shares details about what they have been saying for years, “for modern organizations, their data is their business, and the gateway to that data is the application, and that’s where the

Read More

Alexa Guard makes Waves for DIY Security and Insurance (but only a Ripple for Security Providers)

Alexa Guard will have more influence on the insurance market, than on professional security monitoring

Read More

Cyber Security Whodunnit: Challenges in Attribution of Targeted Attacks

Despite challenges, attribution remains an important part of attack analysis

Read More

Verisign releases DDOS Trends Report of Q2 2018

Observes a 35 percent increase in the number of attacks compared to Q1 2018

Read More

How China Used a Tiny Chip to Infiltrate U.S. Companies?

Chinese spies reportedly inserted microchips into servers used by Apple, Amazon, and others

Read More

F-Secure, Zyxel Bringing Secure Wi-Fi to Connected Homes

New agreement will see F-Secure Connected Home Security built into Zyxel’s residential gateways

Read More

Sequretek launches Next Gen Enterprise Endpoint Detection Prevention Response

Endpoint Detection, Protection, Response (EDPR) based on Artificial Intelligence that helps simplify endpoint security across heterogeneous operating systems

Read More

Infosys Foundation to Build Center for Handling Cybercrime Investigation

Signs MoU with Data Security Council of India and Criminal Investigation Department of Karnataka Police

Read More

Janrain joins forces with Trusona

Partnership will improve customer experience and enhance security

Read More

Data Privacy and Encryption is Critical to your Digital Security

Personally identifiable information can be used by fraudsters to commit online as well as offline fraud

Read More