Tag "Security"

BlackBerry Intelligent Security: The first Cloud-based solution with real-time adaptive security and artificial intelligence

By : CIOL Bureau

BlackBerry Limited announced the launch of BlackBerry Intelligent Security, the first cloud-based solution that leverages the power of adaptive security, continuous authentication and artificial intelligence (AI) to enhance mobile endpoint security in zero-trust environments. BlackBerry Intelligent Security uses a combination

Vulnerability in Xiaomi’s Pre-Installed Apps: When Security Is Not What it Seems

By : CIOL Bureau

Smartphones usually come with pre-installed apps, some of which are useful and some that never get used at all. What a user does not expect, however, is for a preinstalled app to be an actual liability to their privacy and

Bolstering the Weak Links in Your Data Security Policy

By : CIOL Bureau

By Anjani Kumar, Country Manager -India & SAARC at Raritan Today, the threat landscape has evolved considerably with a rapidly growing number of cyber- attacks. As governments and businesses become more digital than ever, they cannot ignore the looming data

71% of Indian consumers view ‘security’ as the most important element of their online experience says Experian report

By : CIOL Bureau 1

Experian released the 2019 Experian Identity and Fraud Report: Asia-Pacific Edition. The report highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers including India,

Trend Micro: Mounting Cloud Email Threats to Office 365 Require Second Layer of Defense

By : CIOL Bureau

Trend Micro Incorporated announced that its Cloud App Security tool blocked nearly nine million high-risk email threats in 2018 as attackers continued to evolve their tactics, highlighting the importance of investing in multi-layered protection for online platforms like Office 365.

Redefining security for the Real-Time Enterprise in 2019

By : CIOL Bureau

By Bryan Sartin, Executive Director, Global Security Services, Verizon Enterprise Solutions Last year was a year of digital acceleration, as new technologies such as 5G, artificial intelligence and the next-gen cloud moved into the realm of reality and started to

Cloud and Mobile Deployments Are the Weakest Links in Enterprise Networks: Check Point’s 2019 Security Report

By : CIOL Bureau

Check Point Software Technologies Ltd. has published the third instalment of its 2019 Security Report. It highlights how threat actors are increasingly targeting the weakest, least protected points in an organization’s IT infrastructure – their public cloud and mobile deployments.

Secure your Smartphone right now: Uninstall These 22 Android Apps

By : CIOL Bureau

No doubt, all the apps go through an intensive security check to get listing in Google Play Store, still there are hackers who can get through and hack your device. Apps could contain virus to gain access to the phone. In a study

REVE Antivirus Launches Upgraded Version of REVE Mobile Security Software for Smartphones

By : CIOL Bureau

With the growing number of virus attacks mobile phone users are increasingly becoming prey to the hackers. People are at high risks to become a victim to ransomware, data theft and theft of other sensitive information.The digital attacks on mobile

K7 Computing Announces Strategic Repositioning and Expansion of its Enterprise Security Business

By : CIOL Bureau

At its annual K7 Odyssey event, K7 Computing announced a strategic repositioning of its business, along with a new brand appearance, marking a strong commitment to helping businesses, from SOHO to large enterprise, secure their digital business. Building on its

CIO’s limited vision of Securing Access to Networks and Servers

By : Ashok Pandey

Hybrid cloud and data centres are on the rise, most of the businesses are choosing them to store their data. Yet, every now and then, we here about breaches. Are hackers smarter than our CIOs? Or CIOs are making some

Google Data Breach: Tips to Keep your Data Secure

By : Ashok Pandey

Following this morning’s news that the data of up to 500,000 Google+ profiles was exposed, Norton by Symantec shares some useful tips to take back control of their cyber safety and privacy. Tips include: Keep your passwords fresh: Don’t use

3 Essential Tips to Protect You from Cyber Attacks

By : CIOL Bureau

By Ellie Martin, co-founder of Startup Change Group One of the most pressing issues of the technological age goes largely overlooked. Cybersecurity is our last line of defense against cyber warfare. Virtually all of our information is online. So much

75% of APAC IT Security Teams believe that their IoT Devices are not Secure

By : CIOL Bureau

A new global research study conducted by the Ponemon Institute on behalf of Aruba, a Hewlett Packard Enterprise company (NYSE:HPE), has found that the majority of IT security teams believe that a key gap in their company’s overall security strategy

Verizon Digital Media Services adds managed security services to its cloud solution for enterprises

By : CIOL Bureau

Verizon Digital Media Services today announced it has added a round-the-clock managed cloud security offering as part of its global Cloud Security Solution. The managed cloud security component provides access to expert security professionals who monitor and proactively take corrective

Study reveals Indian consumers are more likely to prioritize convenience over security in their app experience

By : CIOL Bureau

Indian consumers are more likely to trade off on app security for convenience, according to a study commissioned by F5 Networks ‘The Curve of Convenience – the trade-off between security and convenience’. While Indian consumers as a whole prioritized security

BlackBerry to Spark Ultra-Secure Hyperconnectivity with New EoT Platform

By : CIOL Bureau

BlackBerry Limited unveils BlackBerry Spark, the only Enterprise of Things (EoT) platform designed and built for ultra-secure hyperconnectivity from the kernel to the edge. Defined as the interconnectedness of people, organizations, and machines, hyperconnectivity is set to revolutionize the way

Cryptojacking Moves to IoT Devices in the Home

By : Soma Tah

BANGALORE, INDIA: Fortinet’s latest research reveals cyber criminals are becoming smarter and faster in how they leverage exploits to their advantage. They are also maximizing their efforts by targeting an expanding attack surface and by using iterative approaches to software

VMware Announces Intent to Acquire CloudHealth Technologies

By : Ashok Pandey

At VMworld 2018, VMware, Inc. announced that it has signed a definitive agreement to acquire CloudHealth Technologies. With over 3,000 global customers, CloudHealth Technologies delivers a cloud operations platform across AWS, Microsoft Azure and Google Cloud. The platform enables customers

Symantec Expands Security Operations Center In India

CHENNNAI, INDIA: Symantec has announced the enhanced expansion of its Security Operations Center (SOC) in Chennai, India. Customers in India and across the globe can now expect enriched access to security intelligence insights, and faster detection and response through greater