Check Point Introduces the Cyber Security Architecture of the Future: Check Point Infinity
Check Point Software Technologies Ltd. (NASDAQ: CHKP) today introduced Check Point Infinity, a revolutionary cyber security architecture designed to meet the critical security needs of...
Strategies to build your cybersecurity posture
“You clicked on an infected message…” In my prior life of managing an enterprise email environment, I started thousands of messages with that response...
Argus Cyber Security Hacks Car Using Dongle Device
Argus Cyber Security, the Israeli cybersecurity company, said late last week that it was able to hack into a vehicle’s internal communication system using...
‘Web cops’ to check cyber crimes in Andhra Pradesh
HYDERABAD: With cases of cyber security breaches increasing by the day, Andhra Pradesh has decided to introduce the concept of 'web constabulary'. In fact,...
How AIG’s Cyber Security Gamble Could Pay Off
American International Group (AIG) has recently begun offering personal cyber security insurance plans to individuals. The company appears to be riding a wave of...
What is BrickerBot?
It was only a matter of time until a new type of malware would target Internet of Things devices. BrickerBot, as this new threat...
These Are 10 Cybersecurity Myths That Must Be Busted
Cybersecurity was huge in 2016. From ransomware to weaponized Internet of Things (IoT) devices to foreign hacking of elections – last year saw it...
A Brand New McAfee Commits to Building a Safer Future
SANTA CLARA--McAfee, the globally trusted security provider, announced today that it has begun operating as a new standalone company. As a standalone business, McAfee...
BW Businessworld Roundtable On Cyber Security: Today’s Challenges & Sustainable Solutions
In wake of the continuous technological advancement every second, the dark side of the Internet is getting darker. The world has witnessed recurrent number...
How AI can ‘change the locks’ in cybersecurity
Some of the world’s best-known brands have invested millions of dollars in information security. So have their adversaries. But malicious actors are counting on...