Five tips for securing Docker containers webinar now available for viewing!

This post was originally published here by casey pechan. Last month we debuted a webinar that answered all of your burning containerization security questions: 5 tips to securing Docker containers. In this webinar we broke down the architectural differences with containers and some of the best practices for securing them. In particular, we discussed how security […]

Steps to nullify the effect of a Cyber Attack!

As enterprises around the world are marching towards digitalization, no organization is said to be immune to cyber-attacks. Remember, if hackers can target companies like Equifax, Yahoo, NSA and SEC they can also take a call at your organization anytime.  So, the question is to be smartly prepared to tackle any and every situation after […]

How businesses can protect their computers from Ransomware like Petya

Worried about Ransomware like Petya crippling your business…? Then just follow these steps to protect your computers from the said malware. 1.) Train your staff to be suspicious- Being suspicious in some cases do works and here’s the best reason to prove it. According to a study carried out by Kaspersky Labs 60% of ransomware […]

What to do when you are hit with ransomware?

May 12th of this year witnessed a global Wannacry Ransomware outbreak which targeted more than 200,000 computers across 150 nations. The cyber threat not only exploited all unpatched Windows machines but once again proved that the digital world is extremely vulnerable to sophisticated cyber attacks. Cyber Security firm Kaspersky released a recent white paper titled […]

How to protect yourself from WannaCry Ransomware virus?

Do you want to protect yourself from WannaCry Ransomware Attack? If yes, then just follow the below steps to make your computer & network ransomware free. Keep your backups ready- Ransomware basically locks down your files from access by encrypting them. The victim can decrypt them only when they pay a ransom to the developer […]

Consider these Cloud Security Tips while moving data or workloads to Cloud

As long as the data or workloads remain in your corporate territory, you are the only boss who could access and manage it. But when you plan to move your workloads to external data centers, then technically the usual parameters related to network perimeter security doesn’t apply. Therefore, before making a Service Level Agreement (SLA) […]

How to raise your mobile security quotient?

In the past few months, rogue apps from developers in China have succeeded in slipping into the app stores owned by Google and Apple. These apps usually masquerade themselves as big retailers like Zappos, Dillard’s or Nordstrom or pose as most downloaded games like Pokemon Go. They somehow try to coax the mobile users in […]

Share this page