This IDC study analyzes the enterprise mobility management (EMM) market in 2015. In addition to ranking of the top 14 vendors by revenue, it provides an overview of key market trends and events that helped shape the market landscape in 2015.
More than 32.8 million Twitter credentials have been compromised and are being offered for sale on the dark web, claims LeakedSource, a subscription-based breach notification service. But some security experts question whether the credentials are current and authentic.
Dropbox is keeping a close eye on the latest news reports of big-name, big-data breaches, but says the reported hackers are bluffing when claiming to have compromised and obtained the web storage service's data.
Some 85 percent of the mobile banking apps in the Asia-Pacific region fail basic security checks, according to a recent study by AppKnox. Experts outline the challenges faced by banks in securing mobile apps and share some recommendations.
Akamai warns of a rash of less sophisticated attempts to extort companies by threatening to strike with distributed denial-of-service attacks, which can be expensive for organizations to defend against.
Many organizations still fail to practice smart web security, warns penetration testing expert Ilia Kolochenko, who notes that 23 percent of all websites still use SSL version 3, despite it leaving them at risk from POODLE and BEAST attacks.
The third edition of ISMG's Data Breach and Fraud Prevention Summit in Asia took off June 8 in Mumbai. Here are some highlights and first impressions from the day-long event, featuring key industry thought leaders.
Demonstrating the return on security investment and getting management buy-in remain some of the less glamorous, but very real challenges faced by Indian CISOs, says Shivkumar Pandey of the Bombay Stock Exchange.
The data breach notification service LeakedSource claims we're nowhere near the end of big-name, big-number data breaches, such as those at LinkedIn and MySpace, with "bigger fish" to come.
Insider fraud is one of the biggest challenges facing Indian security practitioners, yet they struggle to respond to insider crimes, says Berjes Shroff, CISO of Godrej Infotech, and a speaker at the ISMG Data Breach & Fraud Prevention Summit Asia in Mumbai.
ISMG's upcoming Data Breach & Fraud Prevention Summit Asia 2016 in Mumbai will focus on the latest fraud techniques and technologies, as industry thought leaders take us through new approaches to tackle breaches as well as today's top schemes and solutions to stop them.
New threats require more than new strategies and tools - security teams need to adopt a different mindset. Here are six steps that Intel Security's Foundstone consultant team suggests based on their experience as incident response first responders. These steps will help you think like an attacker and better fortify...
How current and effective are your incident response practices? This paper summarizes the top 10 incident response mistakes in the field, highlights issues so you can review your incident response practices, and determines whether you suffer from these shortcomings.
TeamViewer is strengthening the security of its remote access application after an uptick in account takeovers that the company says is the result of hackers reusing account credentials from recent data breaches.
Narayan Neelakantan, outgoing CISO at the National Stock Exchange of India, is concerned that the lack of capacity in incident response is going to haunt Indian organizations in the near future. He shares insight on IR maturity and the imminent need.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.