Estimated reading time: 3 minutes
The recent lawsuit filed against Anthony Levandowski of Uber signifies how terrible insider threats can be and what effects they can have on the confidential data sets. The lawsuit was filed by Alphabet which accused Levandowski of stealing more than...Estimated reading time: 3 minutes
The underlining concept of web content filtering has evolved over the years. While it started with SMEs blocking select websites and restricting access, the current set of technologies relies heavily on overall security, legal repercussions, and productivity. Previously, the...Estimated reading time: 3 minutes
With increased mobility of the workforce, the Internet of Things increasing presence across industries and companies adopting BYOD policies, endpoint security is becoming the most challenging task for security teams within organizations. Further the ever-growing threat landscape tends to...Estimated reading time: 3 minutes
According to security experts, any device that connects data subjects to the Internet is vulnerable to threats. Although, security solution providers are constantly improving the security standards associated with the routers; not a lot has been achieved in terms...Estimated reading time: 2 minutes
AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In October...Estimated reading time: 3 minutes
Although there aren’t many predefined standards for naming malware and vulnerabilities, they are often segregated according to the genre, impact and even malicious functionalities. Moreover, giving unique names to the vulnerabilities is nearly impossible due to the expansive conglomerate...