The exponential thrust in digitization has all organizations adopting new technology as the Threat Landscape in India is growing at much faster pace. The recent Ransomware attacks in India has only taught us cybercriminals in 2023 will only be fine tuning their methods.
To curb the rising number of cyber security...
With digital transformation, the IT landscape is fragmented and security is no longer limited to a rigid perimeter.
As per Mandiant‘s Cyber Security Forecast 2023, Ransomware will continue to have a strong influence on the global cyber security threat landscape. Europe could soon replace the United States as...
The U.S. Department of Defense is looking for a few good hackers to penetrate a facilities network underpinning the Pentagon's basement, mezzanine, and the command and communications center used by the president and the secretary of defense. Defense has hosted white hat hacking sessions since 2016.
As organizations look to consolidate security portfolios to reduce cost, the question in the minds of most CISOs is: How can I do more with less? Iftekhar Hussain, principal product manager, cyber threat hunting with Microsoft India, discusses how to use AI and fewer tools to avoid manual work.
"Technologies like...
This report shows how IBM Security ReaQta provides complete endpoint threat coverage of sophisticated cyberattacks with virtually no human intervention while producing top-quality alerts.
Download this report to learn about how ReaQta delivered:
100% detection coverage across the cyber kill chain
No...
What happens when a water management facility –classified as critical infrastructure and essential services– is infiltrated by a foreign threat actor?
This case study dives into an in-depth analysis of the security challenges faced, conditions under which the breach happened, and how the whole situation was...
This report dives deep into the modern endpoint detection and response (EDR) platform that is driven by artificial intelligence/machine learning for security effectiveness.
Download this report and learn more about:
Advanced automated threat detection and response capabilities, with no need for human...
Black Hat Europe returns to London, offering deep dives into the latest cybersecurity research and trends, including how to build an open, transparent, but also secure internet; harvesting zero-day flaws before attackers; what we can learn from "metaparasitical" scammers who scam scammers; and more.
As organizations look to consolidate security portfolios to reduce cost, the question in the minds of CISOs is: How can I do more with less? Iftekhar Hussain, principal product manager of cyber threat hunting with Microsoft India, discusses how to use AI and fewer tools to avoid manual work.
When it comes to advanced threat response, most financial institutions say their current abilities are average. Only one-third say automation is crucial to how they identify and respond to threats. This ebook is developed from a recent survey & related panel discussion of APAC and ANZ experts who analyze the state of...
When it comes to advanced threat response, most financial institutions say their current abilities are average. Only one-third say automation is crucial to how they identify and respond to threats. This panel of APAC and ANZ experts analyzes the state of security automation in financial services.
Tributes are being paid to Vitali Kremez, who has died at the age of 34 in a suspected scuba-diving accident. The renowned threat intelligence expert, born in Belarus, had long tracked Russian cybercrime syndicates and was part of an ad hoc group established to counter ransomware and help victims.
Jamf plans to buy startup ZecOps to extend its ability to detect and respond to sophisticated threats across Mac, iOS and Android devices. Jamf's proposed acquisition will provide threat hunting tools to determine if any advanced attacks have compromised mobile devices.
This DNS threat report can help you discover the most recent real-life threats you could be at risk for and how DNS-layer security helps you stop threats before a connection is even made.
Download this report to learn more about;
Ways to enhance your security posture
The lifecycle of malicious cyber-attack...
The traditional security monitoring architecture has been troubling security teams with data silos, performance issues, and delays in retrieving archived data for years. Many analysts who continue to operate with the antiquated SIEM architecture stack also experience a high volume of alerts—with many false...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.