Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar...
With the general election approaching this spring to constitute the 17th Lok Sabha, cybersecurity leaders say India must be prepared to thwart foreign cyberthreats and protect electronic voting machines against hacking by using appropriate security measures.
The Reserve Bank of India intends to do away with the one-time password authentication process for online transactions. In a step in that direction, for the first time, it's allowing widespread tokenization of debit, credit and prepaid card transactions to enhance the safety of digital payments.
Account takeover is a rapidly growing arena for
cybercriminals. How can organizations strengthen
both authentication and authorization?
Download this white paper to learn more about:
Why account takeover fraud is a growing and strengthening problem;
How organizations can strengthen authentication and...
"We are living in difficult times ... when the government data is the most vulnerable," says Jayesh Ranjan, principal secretary-IT, electronics and communications & industries and commerce, government of Telangana. He calls for creating "a strong institutional mechanism" to tackle threats.
Organizations looking to ensure the success of their Office 365 migration are carefully planning every aspect of their projects to reduce risk. While this transition presents cost and time savings, you may soon come across a few limitations and email encryption is one of them. Integrating your Office 365 environment...
We are amidst a new "machine identity crisis," says Jeff Hudson, CEO of Venafi. And unless we tackle this growing challenge of how to secure machine-to-machine communication, then enterprise IT and security departments are likely to be overwhelmed.
Healthcare technology has made leaps and bounds in terms of its ability to improve patient outcomes, and yet many technologies are being deployed before security concerns can catch up.
Is your organization exposed to an attack that misuses SSH keys?
You know that your organization is using SSH to safeguard privileged access. But you may not realize that your SSH keys could be vulnerable to insider and cyber threats.
The majority of those we surveyed didn't. Results from a 2017 study show that...
The arrest of 10 men in Uttar Pradesh for allegedly cloning fingerprints of authorized Aadhaar enrollment officers is once again stirring debate over whether it's wise for India to rely so heavily on Aadhaar for authentication.
Is your organization prepared to protect every one of its endpoints when almost 80% of employees use more than one device?
This new eBook explores the following trends and how they will affect your approach to endpoint security:
Continued growth of endpoint devices;
Insufficient machine-to-machine...
Your users connect from many locations and devices. They no longer need the VPN to get work done. What if you had a fast, easy way to protect users anywhere they access the internet?
View this report that provides the 1st line of defense against threats on the internet.
Is your organization prepared to protect every one of its endpoints when almost 80% of employees use more than one device?
This new eBook explores the following trends and how they will affect your approach to endpoint security:
Continued growth of endpoint devices;
Insufficient machine-to-machine...
Is your organization prepared to protect every one of its endpoints when almost 80% of employees use more than one device?
This new eBook explores the following trends and how they will affect your approach to endpoint security:
Continued growth of endpoint devices;
Insufficient machine-to-machine...
Is your organization prepared to protect every one of its endpoints when almost 80% of employees use more than one device?
This new eBook explores the following trends and how they will affect your approach to endpoint security:
Continued growth of endpoint devices;
Insufficient machine-to-machine...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.