India, Now A Key Target For Cyber criminals
by Press Release    Nov 27, 2015
Category : Press Releases
India is increasingly on the radar of cybercriminals from countries like China, Russia and the US.
Embedded Attacks To Replace APTs in 2016
by CXOtoday News Desk    Nov 19, 2015
Category : Press Releases
Kaspersky Lab expects to see a decreased emphasis on ‘persistence’,
Cisco Report Warns Against Flash Attacks
by CXOtoday News Desk    Jul 29, 2015
Category : Research
Cisco 2015 Midyear Security Report reveals the critical need for organizations to reduce time to detection
M&As Pose Cyber Attack Threats To Companies In Asia
Category : Columns
AT&T senior security advisor Vanessa Lew suggests 3 action items for CIOs
Cyber Security Linked To Better Communication
by CXOtoday News Desk    Sep 12, 2014
Category : News & Analysis
Lack of communication and education as well as inadequate security systems are raising the possibility of cyber threat.
CSOs Clueless About Lesser Known Threats
by CXOtoday News Desk    Apr 02, 2014
Category : News & Analysis
Many have even confused AET with the more popular Advanced Persistent Threats (APTs), reveals a McAfee survey.
Advanced Persistent Threats: From “FUD” To Facts
Category : Columns
By shifting paradigm from prevention to detection, organizations can take focused, intelligent action to stay safe.
Top 7 developments in the global threat landscape
by CXOtoday Staff    Jun 04, 2013
Category : News & Analysis
The resurrection of Koobface is a reminder that social networks continue to present a substantial opportunity for intercepting personal information.
Cyber attacks more rampant in technology companies
by CXOtoday News Desk    Apr 25, 2013
Category : News & Analysis
A study noted nearly nine out of 10 Advanced Persistent Threat (APT) attacks are associated with tools developed and disseminated by Chinese hacker groups.
Social networking sites often trigger APT attacks
by Sohini Bagchi    Feb 18, 2013
Adequate social media training to employees, an understanding of advanced threats by IT department and a defensive approach to APT attacks are essential.
PAGE: 12