Blog

Endpoint security

Machine learning approach for advanced threat hunting

  • 199
    Shares
 February 2, 2018

Estimated reading time: 6 minutes

In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind to protect endpoints. All major security solutions are built with layered security models to protect endpoints from today’s advanced threats. Machine learning-based detection is also becoming an inevitable component of these layered...

How Vulnerable is your Small and Medium-sized Business? [UPDATED]

 June 24, 2015

Estimated reading time: 4 minutes

Are you aware that the best targets for hackers and malware authors around the world are small and medium sized businesses? The reasons for this are aplenty, but the most crucial cause of this is that smaller businesses have multiple points of vulnerability. Moreover, the security practices that they adopt...

Indian Businesses Lost $4 Billion Due to Cyberattacks in 2013; 2014 to be Worse

  • 2
    Shares
 December 19, 2014

Estimated reading time: 3 minutes

Cyberattacks in 2013 caused some major financial loses for Indian companies. According to latest reports, the losses accounted to $4 billion. And by the time 2014 ends, the loss could be 30% greater. Reportedly, cyberattacks targeting various organizations in the country have jumped by 30% in 2014 as compared to...

How Prepared is your Business against Data Breach?

 August 8, 2013

Estimated reading time: 3 minutes

Data breach remains one of the most critical threats for any business; large, small, and medium. This post takes you through a quick questionnaire which will help you understand how vulnerable your company is to data breach. What is Data Breach? When confidential data of an organization or an individual...

Why USB drives and CDs are a security risk to your corporate network

 February 26, 2013

Estimated reading time: 3 minutes

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places...