Experiencing Nullcon 2017
Monday, March 27, 2017
Posted by Cyber Security ...
Reader's rate:
0
Started in 2010, Nullcon is an international security conference held annually. In this conference, experts from various domains in information security gather together to give talks and training on next generation defensive and offensive security technologies. For the current year, the... + continue reading
Keep Calm and Apply... Defense in Depth!!!
Monday, March 27, 2017
Posted by Cyber Security ...
Reader's rate:
0
In today's world, data not only resides inside the perimeters but crosses the boundaries of the organizations traveling across different geography, servers, data centers, devices.Infact a variety of devices says smartphones, tablets, PCs, can reside on the cloud. Protecting data has become... + continue reading
Smart Phone Security
Thursday, March 23, 2017
Posted by Cyber Security ...
Reader's rate:
0
A study of smartphone users by Internet and Mobile Association of India and Times Internet Limited states that the number of mobile internet users in India had reached 371 million by June 2016, and is on track to cross 500 million users by 2017. Mobile handset security has three prominent aspects:... + continue reading
Enterprise Mobile Security by MDM, Containerization or Both?
Tuesday, March 21, 2017
Posted by Rajesh Rao
Reader's rate:
0
The realities of BYOD (Bring Your Own Device) create significant challenges when it comes to securing the corporate data residing on users' mobile devices. Corporate and personal apps co-existing on single device poses a threat of unapproved mixture of corporate data with personal apps,... + continue reading
8 Ways to Detect Suspicious Emails
Tuesday, March 21, 2017
Posted by Cyber Security ...
Reader's rate:
0
Phishing attacks through emails have now become a new trend to attack. Although we think we can distinguish between suspicious and trusted emails, we cannot. Attackers spoof the domains of well-reputed companies and brands. However, we can still protect and safeguard our data by being more... + continue reading
Experiencing Nullcon 2017
Keep Calm and Apply... Defense in Depth!!!
Smart Phone Security
Enterprise Mobile Security by MDM, Containerization or Both?
8 Ways to Detect Suspicious Emails

Home Page

Security Articles

Experiencing Nullcon 2017
3views
reads
3 today
Monday, 27/03/17 - 0 comment(s)
Started in 2010, Nullcon is an international security conference held annually. In this conference, experts from various domains in information security gather together to give talks and training... + continue reading

Best Practices

60
reads
9 today
Thursday, 09/03/17 - 0 comment(s)
Some of the major data breaches have been carried out by internal users. A couple of examples are Sports Direct in 2017 and Sage in 2016. In fact, a research by Intel Security had estimated that... + continue reading

Security News

Win a Career in TCS Cyber Security Team
Thursday, 12/01/17
804views
reads
18 today
0 comment(s)
Win a Career in TCS’ Cyber Security Team and grab a chance to be associated with the history of the contest as the Winner of the Inaugural Edition. Welcome to HackQuest, TCS Ethical... + continue reading

Snippets

Wiper Malware And It’s Evolution as Ransomware
Views:
411
reads
16 today
Monday, 27/02/17 - 0 comment(s)
Wiper Malware has been associated with the attacks in 2012 where Shamoon, a wiper malware sample was used to attack a Reputed Saudi oil firm. The infection rendered workstations unusable and... + continue reading

Recent Posts

Experiencing Nullcon 2017
Views:
3
reads
3 today
Monday, 27/03/17 - 0 comment(s)
Started in 2010, Nullcon is an international security conference held annually. In this conference, experts from various domains in information security gather together to give talks and training... + continue reading

This Month Most Popular

E-wallets- How secure Are They in India?
526views
reads
20 today
Friday, 24/02/17 - 0 comment(s)
8th November 2016, the shocking evening for all Indians, as the announcement of demonetization, made everyone surprised but the next day, one of the leading e-wallet provider posted an... + continue reading

Featured Articles

Experiencing Nullcon 2017
Monday, 27/03/17
Total views: 3
0 comment(s)
Started in 2010, Nullcon is an international security conference held annually. In this conference, experts from various domains in information security gather together to give talks and training on next generation defensive and offensive security technologies. For the current year, the conference was held at 'Holiday inn', one of the... + continue reading
Keep Calm and Apply... Defense in Depth!!!
Monday, 27/03/17
Total views: 8
0 comment(s)
In today's world, data not only resides inside the perimeters but crosses the boundaries of the organizations traveling across different geography, servers, data centers, devices.Infact a variety of devices says smartphones, tablets, PCs, can reside on the cloud. Protecting data has become an important aspect more than ever. Moreover, the... + continue reading
Smart Phone Security
Thursday, 23/03/17
Total views: 85
0 comment(s)
A study of smartphone users by Internet and Mobile Association of India and Times Internet Limited states that the number of mobile internet users in India had reached 371 million by June 2016, and is on track to cross 500 million users by 2017. Mobile handset security has three prominent aspects: Hardware, Software and User. Hardware Security... + continue reading
Enterprise Mobile Security by MDM, Containerization or Both?
Tuesday, 21/03/17
Total views: 67
0 comment(s)
The realities of BYOD (Bring Your Own Device) create significant challenges when it comes to securing the corporate data residing on users' mobile devices. Corporate and personal apps co-existing on single device poses a threat of unapproved mixture of corporate data with personal apps, which in turn leads to challenges in data security... + continue reading