Non-signature-based detection is the future of end point protection platforms.
EPP is being deployed to prevent file-based malware attacks, detect malicious activity and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts.
EPP solutions are being deployed...
As businesses surge ahead with agile development processes, cloud and DevOps, traditional security can no longer be the show stopper. Security needs to integrate with the DevOps process to ensure responsibility is shared and security is built in.
DevSecOps enables application security testing by the developer and by...
Human behavior is complex, and it's the weakest link in the cybersecurity chain. This session explores how using an amalgamation of technology based on behavioral analytics and risk modeling can help organizations change the ways they view, perceive and remediate insider risk before it becomes a threat or an attack....
Cyber threat intelligence is a key cyber risk management enabler, providing the context necessary to inform decisions and action across the business. Whether related to incident response, monitoring and detection, or governance and policy making, well-structured cyber threat intelligence functions serve stakeholders...
The privacy movement is gathering steam in India, with the Supreme Court recently ruling privacy is a fundamental right of citizens. However, a more immediate scramble is underway is to understand how Indian enterprises have started adapting to GDPR regime.
How has the GDPR mandate impacted Indian organizations,...
Visibility has been a big challenge for every security practitioner. The exponential increase in the volume of incidents as well as the amount of threat intelligence and advisories that a typical security team needs to sift through on a daily basis, along with the increasing sophistication and stealth employed by...
The government of India is hopeful that the nation can build a $15 billion Internet of Things industry by 2020. MeitY has been developing standards for operating IoT across technologies and using data security as an enabler for adopting IoT.
According to a recent study, India now has 41 IoT use cases, including...
In the wake of ransomware attacks such as WannaCry, what lessons must India learn? While WannaCry was not particularly sophisticated or stealthy, its impact was widespread. That's because of the techniques used to rapidly distribute the malware, as well as the failure of so many organizations to get security basics...
When it comes to attack trends, we are seeing a much higher degree of sophistication than ever before. While nation-states continue to set a high bar for sophisticated cyberattacks, some financial threat actors have caught up to the point where we no longer see the line separating the two. Financial attackers have...
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.
Based on...
Mobile is quickly establishing itself as the payment channel of choice for a majority of Asians to conduct billions of mobile transactions in the near future in the digital cashless economy. As users increasingly adopt new payments platforms, including Apple Pay and Samsung Pay, cybercriminals are devising new ways to...
A majority of security professionals believe that incident response has become more difficult in the past couple of years. The idea of early detection through threat feeds is becoming a myth. Any amount of resources and security controls deployed is turning to be only a futile effort in dealing with the new age...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.