"We are living in difficult times ... when the government data is the most vulnerable," says Jayesh Ranjan, principal secretary-IT, electronics and communications & industries and commerce, government of Telangana. He calls for creating "a strong institutional mechanism" to tackle threats.
Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Expansive enterprise digital certificate and PKI usage, coupled with the advent of massive Internet of Things (IoT) device introductions, requires automation for secure and scalable...
We are amidst a new "machine identity crisis," says Jeff Hudson, CEO of Venafi. And unless we tackle this growing challenge of how to secure machine-to-machine communication, then enterprise IT and security departments are likely to be overwhelmed.
Healthcare technology has made leaps and bounds in terms of its ability to improve patient outcomes, and yet many technologies are being deployed before security concerns can catch up.
Is your organization exposed to an attack that misuses SSH keys?
You know that your organization is using SSH to safeguard privileged access. But you may not realize that your SSH keys could be vulnerable to insider and cyber threats.
The majority of those we surveyed didn't. Results from a 2017 study show that...
The arrest of 10 men in Uttar Pradesh for allegedly cloning fingerprints of authorized Aadhaar enrollment officers is once again stirring debate over whether it's wise for India to rely so heavily on Aadhaar for authentication.
Is your organization prepared to protect every one of its endpoints when almost 80% of employees use more than one device?
This new eBook explores the following trends and how they will affect your approach to endpoint security:
Continued growth of endpoint devices;
Insufficient machine-to-machine...
Your users connect from many locations and devices. They no longer need the VPN to get work done. What if you had a fast, easy way to protect users anywhere they access the internet?
View this report that provides the 1st line of defense against threats on the internet.
Is your organization prepared to protect every one of its endpoints when almost 80% of employees use more than one device?
This new eBook explores the following trends and how they will affect your approach to endpoint security:
Continued growth of endpoint devices;
Insufficient machine-to-machine...
Is your organization prepared to protect every one of its endpoints when almost 80% of employees use more than one device?
This new eBook explores the following trends and how they will affect your approach to endpoint security:
Continued growth of endpoint devices;
Insufficient machine-to-machine...
Is your organization prepared to protect every one of its endpoints when almost 80% of employees use more than one device?
This new eBook explores the following trends and how they will affect your approach to endpoint security:
Continued growth of endpoint devices;
Insufficient machine-to-machine...
Although there have been no reports of Flokibot banking Trojan infections in India, experts say it's highly likely that the Zeus-derived malware is already infecting POS devices in the nation.
With a dispersed business development staff that spends their days out of the office working directly with agents and customers, Frederick Mutual's IT team was challenged to find technology that could increase responsiveness to customers and overall productivity. After testing iPads in the field, both IT and employees...
This IDC study analyzes the enterprise mobility management (EMM) market in 2015. In addition to ranking of the top 14 vendors by revenue, it provides an overview of key market trends and events that helped shape the market landscape in 2015.
The mobile workforce has arrived, and employees everywhere are leveraging the convenience of their smartphones and tablets. But while workers enjoy the freedom of being slightly less tethered to their desks, IT minds the security risks.
Mobile device management (MDM) lets IT be the voice of reason while granting...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.