Two security issues disclosed by Facebook over the past month are worse than first thought, adding to a harrowing series of data-handling mishaps by the social network. Millions of Instagram users had their plain-text passwords stored, and 1.5 million people had their email contact lists uploaded without consent.
The discovery of an apparent data breach at Indian IT service firm Wipro could hurt the firm's reputation, as well as the reputation of other outsourcing companies, some observers say.
Research results from over 1,000 global key decision makers with visibility over access management confirm that security professionals are aware that a breach is only a matter of time, with 50% of respondents having already suffered a serious breach or expecting to experience one over the next six months (up from 42%...
Unix and Linux build the foundation for most business-critical systems. Thus, they present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, security teams must follow an integrated approach, covering both privilege elevation and centralized...
The abuse and/or misuse of privileged credentials plays a role in almost every cybersecurity breach incident today. With privileged access in hand. an attacker essentially becomes a malicious insider - and that's an alarming scenario for any IT professional, all the way up to the C-level and the Board.
Privileged...
SOC processes are broken, analysts are feeling the cybersecurity job fatigue, and enterprises are still at risk. SOC leaders often struggle to understand how to make their teams more effective and end up spending their budget on point solutions that add to the problem of data overload. How do you improve security...
Because traditional tools are not helping in detecting threats or reducing noise, the need of the hour is a unified threat dashboard, says Vishak Raman, director of security business for India and SAARC at Cisco.
Four unprotected application program interfaces for JustDial, a local search engine in India, are leaking the personally identifiable information of its more than 100 million customers in real time, says an independent security researcher who discovered the vulnerability.
Indian IT service firm Wipro on Tuesday said that it has detected abnormal activities on some of its employee accounts due to an advanced phishing campaign. An investigation is continuing, the company confirms.
To comply with Security and Exchange Board of India's recent cybersecurity guidelines for stock brokers and depository participants, the Bombay Stock Exchange has implemented a community security operations center, which will provide services to more than 1,000 member brokers.
Microsoft says intruders targeting its email services had access to email content for a single-digit percentage of the overall affected accounts, a more serious conclusion than first thought. But the company hasn't released many details, including the total number of accounts affected.
When it comes to browser security, one mistake made by consumers and enterprise alike is that they see the browser as a one-way window into the internet. The reality is quite different - and potentially costly if overlooked, says Pieter Arntz of Malwarebytes.
Cyber criminals are taking relentless aim at financial institutions. Cargills Bank is taking a proactive approach to better safeguarding customers with a cognitive security solution, IBM QRadar Advisor with Watson. Analysts can readily examine a broad range of threat data and gain actionable insights to make decisions...
Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to The Ponemon Institute's fourth annual study on the Cyber Resilient Organization.
This new study, sponsored by IBM Security, will show security leaders:
The key factors that hinder the ability for...
Artificial Intelligence (AI) bridges this gap and unlocks a new partnership between security analysts and their technology. But it's not humanly possible for your SOC team to keep up with the growing threat landscape while dealing with routine security operations tasks.
Download this infographic to explore:
...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.