Giridhara Raam M, Marketing Analyst, ManageEngine discusses that it’s been a year since GDPR came into effect. So far, it has brought more security to EU citizens’ personal data. Though this European data protection law has brought better security to end users, it’s left many businesses struggling to modify theirRead More…

Greg Day, Vice President and Regional Chief Security Officer, EMEA at Palo Alto Networks discusses that as digital agility is increasingly seen as a key business advantage, businesses need to challenge the status quo and move towards a new model of cybersecurity consumption.Read More…

Mahmoud Mounir, Regional Director at Secureworks META explains as the information security is evolving fast and with adversaries armed to tooth, organisations need to develop more comprehensive strategies to tackle the rising tide of security risks and needs to be more prepared to beat the adversaries.Read More…

Tomas Foltyn, security writer at ESET discusses that a team of two hackers recently Richard Zhu and Amat Cam, aka team ‘Fluoroacetate’ hack the electric automaker, Tesla car via its infotainment system.Read More…

Derek Manky – Global security strategist, Fortinet, says that many developers, along with professional threat researchers, employ a technique known as Fuzzing that is designed to discover vulnerabilities in hardware and software interfaces and applications. By injecting invalid, unexpected, or semi-random data into an interface or program, security engineers can then monitorRead More…