Skip to main content
Home

Main menu

  • News
  • Security Agenda
  • CSO100
  • Threats
  • Compliance
  • Breaches
  • Videos
  • tw
  • fb
  • rss

Quick links:

  • CISO Speaks
  • CISO Movements
  • Latest Hacks
  • Malware
  • Vulnerabilities
  • Patches & Updates
  • Advisory Board

Sections:

  • News
  • Security Agenda
  • CSO100
  • Threats
  • Compliance
  • Breaches
  • Videos
  • tw
  • fb
  • rss

Breadcrumb

  1. Home
  2. Threats

Threats: Ransomware

Mobile ransomware, banking malware threats on a rise: Report
What is ransomware? How it works and how to remove it
CSO Alert: The 5 biggest ransomware attacks of the last 5 years
Inside the thriving ransomware market

Threats: How AI can help

Artificial intelligence is the way forward for enterprise security: Sunil Sharma, Sophos
How AI can help you stay ahead of cybersecurity threats
How AI can stop tomorrow's malware threats today

Threats: How to protect your enterprise

What is enterprise risk management? How to put cybersecurity threats into a business context
Are you prepared for evolving threats?
Defend Against The Continually Mutating Array Of Network Threats And Cyber Attacks
Emerging technologies to combat new age threats

Threats: Mobile Security

The top 5 mobile security threats
Five new threats to your mobile device security
Protecting the enterprise against mobile threats

Threats: What OEMs are doing

Symantec introduces new Email Threat Isolation solution
Microsoft announces security innovations to help manage threats from cloud to edge
Fortinet releases FortiGuard AI to deliver proactive threat detection
McAfee releases 2019 Threat Predictions Report

SECURITY AGENDA

Security and business are intertwined: Prasad Mandava, Akamai India
Indian enterprises are highly exposed to advanced cyber threats: Bhaskar Bakthavatsalu, Check Point
Adopt a ‘trust, but verify’ approach for a zero trust security environment: Edgar Dias, F5 Networks
Enterprises should invest in people and build cyber threat-hunting practices: Shrikant Shitole, FireEye
Critical enterprise and govt data will be the new oil: Surendra Singh, Forcepoint
Automated threat intelligence is a valuable tool against attack vectors: Rajesh Maurya, Fortinet
A cognitive SOC can help determine threats which are applicable to you: Vaidyanathan Iyer, IBM India/South Asia
AI, AR and blockchain are disrupting the cybersecurity landscape: Shrenik Bhayani, Kaspersky Labs
Next big wave of innovation in cybersecurity solution is ML and AI: Venkat Krishnapur, McAfee India
Big data analytics, AI and blockchain can help reclaim surrendered ground: Anil Bhasin, Palo Alto Networks 
Businesses must focus on digital risk management : Rajnish Gupta, RSA
CISOs must shape IT security programs around overall corporate strategy: Gaurav Agarwal, Symantec
CSOs must develop a training program focused on advanced threats: Nilesh Jain, Trend Micro

Security Trends for 2019

State of Cybersecurity

A simple app penetration test could have prevented the 7-Eleven data breach, say experts
McAfee in talks for US$1B public market return
Cisco sounds warning on 3 critical security patches for DNA Center
Latest cyberattack from the TrickBot malware family identified: Research

Hacked

Executive Interviews

You can't take a zero-trust view with traditional hub-and-spoke architecture: Scott Robertson, Zscaler
Vulnerability management, surface visibility is imperative for modern CSOs: Gerry Sillars
Spear phishing has come a long way since the ‘Nigerian prince’ racket: Hatem Naguib, Barracuda
Bring your own key to resolve trust issues: Jin MA, Alibaba Cloud

Footer

  • About Cso
  • ADVERTISING
  • PRIVACY POLICY
  • Contact Us
  • tw
  • fb
  • rss
X

idg

Copyright © 2005-2019 IDG Media Private Ltd. All rights reserved

Reproduction in whole or part in any form or medium without express written permission of IDG Media Pvt. Ltd is prohibited.

the idg network

  • THE IDG NETWORK:
  • Cio.in
  • ComputerWorld.in
  • Channelworld.in