At a time when the world has transformed due to COVID, the cybercriminals found it as an opportunity for exploitation. In addition to the existing attacks, new types of frauds are now spotted in the cyber world.
Nowadays cloud computing and resources has become a popular solution used by people to exchange and store information. Moreover, it has become a place where data is being kept permanently for archival and safe storage
Corporate restructuring is a process of simplifying and reorganizing the corporate governance and operations of an organization to make the organization to become more agile natured, productive, responsive, profitable with an improved quality and time to
Cyber Security trends show that organisations are now realising the importance of data-centric security than relying on perimeter controls only. Information is the most valuable asset that any organisation possesses. Modern businesses entirely depend on d
Researchers from Malwarebytes recently did a study on cybersecurity professionals across five countries - United States, United Kingdom, Germany, Australia, and Singapore
The whole of EU region is chanting a MANTRA now which is GDPR (General Data Protection Requirement), the compliance mandate of which is going to be enforced start from 25 May 2018. This GDPR is a program brought into place to develop, implement and improv
Security researchers have discovered a zero-day vulnerability in Internet Explorer named Double Kill which has been embedded in a Microsoft Office document