@Security & Compliance
Botnet Attacks Witnessed Steady Rise In India In 2016: Fortinet
by Priyanka Pugaokar    May 10, 2017
Vulnerable IT systems remained a prime target of botnet attackers, says Fortinet
5 Rules For CXOs To Prevent Ransomware
by Priyanka Pugaokar    May 08, 2017
Here are five vital rules enterprises should follow to avoid ransomware infections.
Budget Constraint Force CIOs To Compromise On Endpoint Security
by CXOtoday News Desk    May 05, 2017
This is true mostly for SME IT leaders for whom finance is a major constraint, according to a study.
Denial Of life: Medical Devices Are At Risk Of Cyber-Attack
by Anna Jones    May 05, 2017
Hackings of medical devices could also be used to breach patient privacy, as the information contained in the device includes location, treatment history and current state of health.
Centralized Repository Essential To Counter Cyber Threats: Study
by CXOtoday News Desk    May 05, 2017
A central agency may be established to collaborate with private sectors as well and impart training and awareness across the country.
Malware, PUA Infect Over 50 pc Android Devices: Study
by CXOtoday News Desk    May 03, 2017
Even though Android security risks remain pervasive, there’s plenty users can do to minimize their exposure, points out a new Sophos study.
Iris Scanners Are The New PIN
by Salil Prabhakar, CEO, Delta ID    May 03, 2017
Iris scanners measure much better on all scales – security, reliability and ease-of-use. So, what makes iris scanners perform better?
US Visa Norm Forces Indian Techies To Look At Newer Locales
by CXOtoday News Desk    May 02, 2017
Africa, Canada, Latin America and the Nordic nations could be the future IT hubs for Indian Techies.
In 2017 Cyber Criminals Become More Ambitious Than Ever
by Moumita Deb Choudhury    Apr 26, 2017
Cloud security continues to be a challenge for CIOs not just in the government, but also other sectors such as banking, healthcare and retail.
Phishing Attacks: How To Avoid Getting Hooked
Education is the first defense, and the ability to differentiate between legitimate and fraudulent emails is vital.