Tech ObserverSearch
SEARCHED FOR: computer security
ISPAI signs MoU with ISOC to work on routing security in India
ISPAI and ISOC will collaborate to undertake initiatives to promote Internet security in line with government's cyber security measures
Can Facebook, WhatsApp, Instagram be blocked for national security and public order: Asks Modi government to industry
Department of Telecom (DoT) has written to telecom operators and different stakeholder for their inputs to block the applications under Section 69A of the IT Act.
Unidentified traffic is a serious security concern, says Sophos
M Kalam -
Cybersecurity firm Sophos said that majority of Indian IT managers have legal liabilities when it comes to unidentified traffic in their organisations.
This is how budding organisations can mitigate cybersecurity breach
For budding organisations it may appear costly to procure compliant accreditation but it is never harmful to simply follow the best prescribed practices for mitigating the cybersecurity breach.
- Advertisement -
Zebra TC20 mobile computer, TC25 rugged smartphone launched in India
US-based Zebra Technologies that deals in rugged mobile computers, barcode scanners and barcode printers launched a new TC20 mobile computer and TC25 rugged smartphone in India
Symantec, Sophos, Forcepoint ask Modi govt to invest more in cybersecurity to secure India’s digital assets
M Kalam -
Cybersecurity firms such as Symantec, Sophos and Forcepoint have asked the government to adequately focus on cybersecurity to secure country’s digital assets.
5 trends that will change Network Security landscape in 2018
Network Security - With the prospects of new technologies like Artificial Intelligence, Machine Learning, Big Data Analytics and the Internet of Things, there’s also increasing risk of confidential data being maliciously collected, stored and disseminated.
Health and public sectors accounted for more than 40% of total cybersecurity incidents in Q3: McAfee
M Kalam -
The health and public sectors accounted for more than 40% of total cybersecurity incidents in Q3 of 2017, said McAfee Labs Threat Report: December 2017
- Advertisement -
Cyber Security: Rules of engagement have broadened, says Grady Summers, CTO, FireEye
Initial cybercrime game was primarily espionage – governments and militaries spying on one another. Quickly the game changed a few short years later, when hackers started using Windows NT to carry out cybercrime. And later on it moved to militaries pivot in the mid- 2000s and begin hacking the private sector, a sign that the rules of engagement were starting to broaden.
With AI and machine learning, strictly follow cybersecurity processes, says Gulshan Rai
While artificial intelligence (AI) and machine learning are far reaching innovations, there is a need to strictly follow cybersecurity processes.
-Advertisement-