Startups at India and Israel will benefit by Cyber Security Partnership


Governments and enterprises are committed to the protection and the integrity of their own proprietary information and the privacy of their citizens and customers; while the hackers are motivated to collect data for different reasons. The acts of data protection and privacy protection that these organization take, using authentication, cloud security, critical infrastructure security, endpoint protection, next generation firewalls, security automation and orchestration, encryption, data … Continue reading Startups at India and Israel will benefit by Cyber Security Partnership

Does Artificial Intelligence (AI) solve shortage of Cyber Security professionals


Worldwide Revenue for Security Technology Forecast to Surpass $100 Billion in 2020, According to the New IDC Worldwide Semiannual Security Spending Guide. The industries that will see the fastest growth in their security investments will be healthcare (10.3% CAGR), followed by telecommunications, utilities, state/local government, and securities and investment services. “The pace and threat of security attacks is increasing every year, especially across compliance-driven industries like … Continue reading Does Artificial Intelligence (AI) solve shortage of Cyber Security professionals

IoT security guidelines released by GSMA


The GSMA released a set of security guidelines for the Internet of Things (IoT) in a bid to ensure services are reliable and trustworthy. They take the form of separate documents targeted at the major component parts of the IoT value chain, such as the service, network and terminal. The idea is that by following these guidelines, the industry will develop IoT services and devices … Continue reading IoT security guidelines released by GSMA

Security regulatory compliance for telecom operators


The DoT (Department of Telecommunications) in India has enforced the telecom operators holding license(s) to ensure that they comply to security amendment dated 31st May 2011, likewise Ofcom in UK and other nations has got regulatory compliance for telecommunication industry to adhere The Chief Information Security Officer (CISO) plays a vital role in developing security policies. Subsequently the controls get implemented & business shall assure the … Continue reading Security regulatory compliance for telecom operators

Stuxnet: Are we prepared to defend


What is SCADA? – SCADA in an acronym for Supervisory Control And Data Acquisition, a category of computer programs used to display and analyze process conditions. Poorly understood by most non technical authors on the subject, SCADA is only one component of an automated facility and does not directly interfere with actuator devices such as valves, pumps, or motors – this is achieved by industrial controllers that operate in real time and have no display and keyboard. … Continue reading Stuxnet: Are we prepared to defend

China tried to hack India’s computers


LONDON: Chinese hackers have tried to penetrate computers in the offices of national security adviser MK Narayanan, a British paper on Monday quoted him as saying. Narayanan said his office and other government departments were targeted on Dec 15, the same date that US defence, finance and technology companies, including Google, reported cyber attacks from China. “This was not the first instance of an attempt … Continue reading China tried to hack India’s computers

UK Government’s Cyber Security Squad to Launch in March


UK’s Cyber Security Operations Centre (CSOC) will become operational on March 10 next year, according to the government. The centre, which has the role of fending off cyber attacks against the country’s computer infrastructure, will initially have a staff of nineteen. The Cyber Security Operations Centre was established, along with the Cabinet Office of Cyber Security, as part of UK’s new National Cyber Security Strategy … Continue reading UK Government’s Cyber Security Squad to Launch in March