Estimated reading time: 2 minutes
Endpoint security acts as the vanguard against an enterprise’s battle against cyber attacks. This is because every device that connects to a corporate network is in most cases the first point of penetration for threats and malware. For enterprises...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 4 minutes
Globally, as enterprises gather and integrate optimum avenues to secure their information technology infrastructure from cyber threats, somehow, hackers are still managing to find a way to break-in. Cybersecurity vigilance has driven business stakeholders to secure core networks with...Estimated reading time: 3 minutes
DDoS Attacks on Rise…. As per recent cyber security reports, there has been a rise in DDoS attacks in Q1 2019, with number of attacks lasting more than an hour. Many researchers believe that cyber attackers who had been doing DDoS attacks for monetary gain, had focused their...Estimated reading time: 5 minutes
Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a...Estimated reading time: 2 minutes
Enterprises are recently waking up to the usefulness of having layered protection for their networks. This involves investing in various layers of protection such as anti-virus, anti-malware, anti-spyware and a firewall. However, firewalls while providing protection can often fall...