Zscaler terms Symantec patent infringement lawsuit as Cyber bullying
Cloud Security vendor Zscaler has termed Symantec’s latest patent infringement lawsuit as a mere cyber bullying tactic which doesn’t have any merit. It also...
Cyber Attack to blackout Virgin Media Internet users for one month
UK’s most popular internet service provider Virgin Media has released a press statement on Tuesday saying that it has become a recent victim of...
Software-defined security for burnout avoidance
You look at the alarm clock that’s proven to be amazingly resilient to abuse, particularly the snooze button, and it’s fifteen minutes after midnight...
Ransomware: Hype and Prevention Strategies
One of the biggest digital security threats that businesses, governments, and consumers all face is ransomware. What makes ransomware especially offensive is its capacity...
Hybrid Cloud Security, Part One: Familiar Threats in an Unfamiliar Territory
Cloud computing is rapidly becoming a must-have for organizations of all shapes and sizes, making hybrid cloud security a big concern—and often a big...
Cyber Attack caused power outage in Ukraine capital Kiev
Cyber attack is said to have caused a power outage in Ukraine capital Kiev leaving most of the populace in darkness. According to sources,...
LinkedIn confirms cyber attack on Lynda.com
Lynda.com which is a well known online professional learning portal is said to have become a recent victim of a data breach. As per...
Meath County funds worth €4.3million siphoned through Cyber Attack
Meath County Council has made it official yesterday that it was a recent victim of the cyber-attack in which funds worth over €4.3million were...
Considerations which are mostly overlooked when it comes to Cloud Security
Cloud Security is often ignored or overlooked by big or small companies. The reason, most businesses measure cloud offerings based on the metrics such...
Cyber attack history of Russia on other nations
US President Barack Obama has ordered a probe against the recently concluded US 2016 elections to find whether Russia was involved in influencing &...
MOST POPULAR
How to Quickly Recover After a Third-Party Data Breach
I write all the time about how to prevent ransomware attacks and how the root cause in so many cases is an improperly secured...