TRAI Chairman RS Sharma On Data Protection | Exclusive

Are you ready for India’s NEW Personal Data Protection Law?

With the Indian Government releasing the Justice BN Srikrishna Committee of Experts Report on Data Protection recently, a new law in the form of the Personal Data Protection Bill, 2018, is all ...
Reddit Breach Takeaways: MFA and Access Management

Reddit Breach Takeaways: MFA and Access Management

Reddit has been hacked! Their SMS based authentication was not strong enough to prevent a breach, so they will be moving towards token-based two-factor authentication (2FA)—will that be enough? Discover how a ...

Are we honest about our password habits?

Passwords are always an interesting discussion. While we all are aware that passwords aren’t quite good enough, we’ve yet to turn to any alternatives that are as convenient. PCMag.com recently set out ...

Evolution of the security stack – voke Impact Note

| | Uncategorized
The security stack is changing to include application isolation Employees demand fewer restrictions to do their jobs IT operations teams need help to balance security with user productivity The security landscape is ...
encryption

OCSI Certifies SafeNet Luna PCIe Cryptographic Module for Use as QSigCD and QSealCD

The Italian Organismo di Certificazione della Sicurezza Informatica (OCSI) certified the SafeNet Luna PCIe Cryptographic Module 6.10.9 when embedded within a SafeNet Luna Network HSM 6 “SafeNet Luna HSM 6” for use ...
CyberHero VR: Experience Cybersecurity like you have never seen before!

Visit Gemalto at Black Hat 2018

What are you doing August 4-9? Join Gemalto in Las Vegas for Black Hat USA, an information security event to learn about the latest trends in the industry. Make sure to meet ...
data protection

Is Your Data Hackproof?

The recent cyber attacks on two major Canadian Banks - The Bank of Montreal and Simplii Financial, has shaken the cyber community across the globe. In our latest post, we explore how ...
Consider Access Management

Considering Access Management – PART #4

In this series about considering access management, we've explored ideas around why organizations are adopting IAM solutions, what applications need to be protected and what users need to have access. In this ...
Can You Keep Up with Game-Changing DDoS Attacks? Q&A from Allot’s Webinar

Can You Keep Up with Game-Changing DDoS Attacks? Q&A from Allot’s Webinar

| | Uncategorized
In our recent webinar, I discussed with Maya Canetti, Allot’s Director of Product Management, how intensified DDoS attacks against service providers have become highly destructive. We considered the newest threats, why traditional ...
Access Management Lock

Considering Access Management – PART #3

We've explored why organizations are considering implementing identity and access management solutions (IAM). The solution should not only consider WHO and WHAT needs to be protected; read on to find out why ...
Loading...