Data Security in CloudBy Asupathy Anbazhagan On 4 Oct 2017
In cloud environment, multiple organizations share same resources. There is a chance for data misuse. So it is often necessary to protect data repositories, data in transit or process. This cannot be achieved with a single data protection technology or...
Top Cyber Security influencers you should most definitely followBy Happy Blob On 2 Jun 2017
More than 4,000 ransomware attacks have occurred since the beginning of 2016, according to Computer Crime and Intellectual Property Section. The rise is noticed also in malware, phishing and attacks due to accidental insiders. Security threats are increasing every day...
Detection-Protection-Prevention – The Threat Defense LifecycleBy Mahendra Patukuri On 28 Oct 2016
Cyber-attacks have become an everyday phenomenon today. It is a menace that is growing with each passing day. New types of threats are emerging and their average damage potential is also growing fast. The average cost of a cyber-security/data breach...
Data breach and Cyber attacksBy Mahendra Patukuri On 28 Oct 2016
Data breaches and cyber-attacks are two terms that are increasingly making headlines in the world of Cyber security. Cyber-attacks are made to create data breaches and there are very few data breaches without cyber-attacks. The first has a causal relationship...
Data Loss Detection and ProtectionBy Arnita Chakravorty On 20 Jul 2016
Over the past few years the risk about data loss has increased exponentially. The key attacking factor for a data loss event is people – they handle electronic data and make mistakes.Data loss could be from any of the aspects...
These blogs might interest you
by Mouna Ramesh on 28 Aug 2019
by Subramanya Ajjampur on 2 Aug 2019
Zero Trust Networks offer protection against many data breaches, but the way to them can be difficult
by Jyoti Bilgoji on 22 May 2019
by Viswanath Subramaniam on 29 Mar 2019
Subscribe for blog updates