Cisco Firewall Cisco Next-Generation Firewall Providers in India Stop threats, see what’s happening on your network, and reduce costs with our threat-focused next-generation firewall appliances. Security designed to work together. Simplify security complexity. Keep business more secure. Make IT more productive. Detect and stop threats better with Cisco cyber security products ASA 5500-X with FirePOWER Services Small business, branch office, ...
Read More »Blog
Digital economy push offers hope for multiple players: Mastercard
Digital economy push offers hope for multiple players: Mastercard India’s push towards expanding the digital economy offers room for multiple players to grow in the payments ecosystem, said Michael Froman, vice chairman and president, strategic growth at Mastercard. “Digitisation and expanding the digital economy is good. There is plenty of room for many different types of players in that ecosystem,” ...
Read More »Three cornerstones of cryptographic compliance
Three cornerstones of cryptographic compliance Cryptographic compliance can be a complex subject. India has many cryptographic regulations with which organizations must maintain compliance. In this article we will cover three common compliance requirements that organizations with cryptographic infrastructure must often take into consideration: data localization, the IT Act (message authentication in particular), and PCI compliance. While each of these compliance ...
Read More »Roaming Mantis uses DNS changers to target users via compromised public routers
Roaming Mantis uses DNS changers to target users via compromised public routers Kaspersky researchers reported on a new domain name system (DNS) changer functionality used in the Roaming Mantis campaign. Now cybercriminals can use compromised Wi-Fi routers in cafes, airports hotels, and other public places to potentially infect more Android smartphones with the Wroba.o malware. At the moment, the ...
Read More »Cybersecurity, data theft pose biggest challenges to modern age policing: Union Home Minister Amit Shah
Cybersecurity, data theft pose biggest challenges to modern age policing: Union Home Minister Amit Shah Union Home Minister Amit Shah has said challenges to policing have now drastically transformed: from tackling geographical problems like terrorism and unrest in J&K, left-wing extremism and unrest in the northeast to countering new-age ‘thematic’ threats of cyber security and data theft, with problems becoming ...
Read More »BharatPe appoints Ambuj Bhalla as CISO
BharatPe appoints Ambuj Bhalla as CISO BharatPe on Tuesday announced the appointment of Ambuj Bhalla as its Chief Information Security Officer (CISO). The company has also appointed Rahul Bhatia as the Head of Internal Audit, and Ravinder Oberoi as the Head of Compliance. Bhalla will be responsible for the implementation of robust IT security and cybersecurity frameworks for the ...
Read More »PM Modi backs National Data Governance framework for intelligence exchange across agencies
PM Modi backs National Data Governance framework for intelligence exchange across agencies Backing the emerging technologies and use of the National Data Governance Framework for smooth data exchange, Prime Minister Narendra Modi has asked senior IPS officers to leverage technology for tracking down criminals via better coordination between state police and the Central agencies. PM Modi while addressing the all ...
Read More »Chinese hackers exploit zero day vulnerabilities in networking devices
Chinese hackers exploit zero day vulnerabilities in networking devices Chinese hackers are exploiting zero day vulnerabilities in networking devices, followed by the installation of custom implants, reported The Hacker News. A suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero day attack targeting a European government entity and a managed service provider (MSP) ...
Read More »Hackers now spreading malware via Microsoft OneNote attachments
Hackers now spreading malware via Microsoft OneNote attachments Hackers are now spreading malware using Microsoft OneNote attachments in phishing emails, infecting victims using remote access malware that can be used to install additional malware, steal passwords, or even cryptocurrency wallets. For years, attackers have distributed malware in emails via malicious Word and Excel attachments that launch macros to download and ...
Read More »FBI, CBI officials meet to discuss cooperation on technology-based crimes
FBI, CBI officials meet to discuss cooperation on technology-based crimes Central Bureau of Investigation (CBI). Officials from the top internal investigating agencies of India and the US, Central Bureau of Investigation (CBI) and Federal Bureau of Investigation (FBI), and those from the US Department of Justice met to discuss continued cooperation in addressing dynamic and evolving technology-based crimes. The ...
Read More »