
China’s cyberspace regulator is planning to issue new rules clamping down on file-sharing functions like Bluetooth and Apple’s AirDrop.
You can utlilise these tools to keep your gadgets safe and secure from any malware or online threat.
The healthcare industry has been a primary target for this increasing threats. Indian healthcare organizations witnessed over 2,78,000 cyber-attacks every…
Technology for MSMEs: Incident response refers to a systematic approach taken by organizations to address and manage security incidents effectively.
Daam employs the AES encryption algorithm to encrypt files stored on the victim’s device.
Nowadays a lot of buzz about the establishing a SOC Eco-System is prevailing in all the Critical Infrastructure & Defence…
There are special cyber-warfare units in the Chinese PLA who target not only Indian defence research organizations but other departments…
C3iHub, a cybersecurity Technology Innovation hub at IIT Kanpur has partnered with Tata Advanced Systems to advance cybersecurity solutions through…
Ultimately, it is the responsibility of CISOs, CIOs, and other security leaders to help their teams and leadership understand why…
A proactive approach to cybersecurity is the first step in ensuring a more secure future for enterprises, says Anil Valluri,…
Airports are high value assets of national importance, that operate 24x7x365, and incidents of cyberattacks therein necessitate achieving cyber resilience…
The hacker behind the AMOS malware is constantly improving and updating it with new features to make it more effective.
Reportedly Thodex had temporarily closed its trading for two years
The partners say with Indian automakers being urged by the Ministry of Road Transport and Highways (MoRTH) to ramp up…
The platform is expected to help at least 1.5 million cybersecurity professionals within two years of its launch.
Reportedly, segmentation can greatly aid in enhancing network security
Experts believe blockchain and cybersecurity are different yet interrelated technologies