News

News

Multi-Source Security Analytics on AI- Your Solution to the Modern Cyber Threat Landscape

The threat landscape has changed. Organizations have more vulnerability points than ever—and these will only grow as organizations increasingly embrace the cloud, mobile, and the IoT. Cybercriminals now exploit this wealth of vulnerability points through sophisticated, high-volume, multi-dimensional attacks that produce a flood of threat data. Every day, organizations can face thousands of alerts, and find themselves forced to analyze hundreds of thousands of potentially malicious files…Read more

Multi-Source Security Analytics on AI- Your Solution to the Modern Cyber Threat Landscape

The threat landscape has changed. Organizations have more vulnerability points than ever—and these will only grow as organizations increasingly embrace the cloud, mobile, and the IoT. Cybercriminals now exploit this wealth of vulnerability points through sophisticated, high-volume, multi-dimensional attacks that produce a flood of threat data. Every day, organizations can face thousands of alerts, and find themselves forced to analyze hundreds of thousands of potentially malicious files…Read more

It-Security-Middle-East-Africa

Meltdown and Spectre to Have Substantial Impact

Security MEA speaks with Sunil Bhide, Vice President and Business Head – SOC at Paladion about the latest discovery of flaws in the world of processors that can have a substantial impact.

What has been the extent of impact of the Meltdown and Spectre CPU flaws?
The recently discovered Meltdown and Spectre CPU flaws identifies security risks found in processors designed by Intel, AMD and ARM…Read more

It-Security-Middle-East-Africa

Meltdown and Spectre to Have Substantial Impact

Security MEA speaks with Sunil Bhide, Vice President and Business Head – SOC at Paladion about the latest discovery of flaws in the world of processors that can have a substantial impact.

What has been the extent of impact of the Meltdown and Spectre CPU flaws?
The recently discovered Meltdown and Spectre CPU flaws identifies security risks found in processors designed by Intel, AMD and ARM…Read more

Spearheading AI Adoption in Cyber Security

It takes about 100 days to detect an active advanced threat actor in your environment. As companies try to reduce this delay – via collecting even more data about their networks, users and applications to increase their visibility and deploy more intelligent systems to sift through this enormous data quickly and effectively- big data analytics and machine learning systems will take up centre stage…Read more

Spearheading AI Adoption in Cyber Security

It takes about 100 days to detect an active advanced threat actor in your environment. As companies try to reduce this delay – via collecting even more data about their networks, users and applications to increase their visibility and deploy more intelligent systems to sift through this enormous data quickly and effectively- big data analytics and machine learning systems will take up centre stage…Read more

Trends Security Pros Need to Think about Going into 2018

The biggest cyber security trend we witnessed this year in security communities in the Middle East was Incident Detection and Response. Security professionals are moving away from prevention and alerting systems to proactively hunt threats and respond to them before they can cause a catastrophic breach. However, not all enterprises can afford such capabilities in-house, so they turn to managed security providers that can offer this as a service…Read more

Trends Security Pros Need to Think about Going into 2018

The biggest cyber security trend we witnessed this year in security communities in the Middle East was Incident Detection and Response. Security professionals are moving away from prevention and alerting systems to proactively hunt threats and respond to them before they can cause a catastrophic breach. However, not all enterprises can afford such capabilities in-house, so they turn to managed security providers that can offer this as a service…Read more

Deccan Chronicle

Top Five Cyber Security Trends to Look out for in 2018

While security technologies have grown so have the tactics, techniques, and procedures cyber attackers use to penetrate your defences.

It wasn’t long ago when much of an organization’s daily business processes were fulfilled without the need for computers. All that computing devices provided was an ancillary support to an organization’s framework. Today, digital technology has completely upturned business processes and made them more efficient and effective, enabling us to extract greater productivity in significantly shorter durations of time…Read more

Deccan Chronicle

Top Five Cyber Security Trends to Look out for in 2018

While security technologies have grown so have the tactics, techniques, and procedures cyber attackers use to penetrate your defences.

It wasn’t long ago when much of an organization’s daily business processes were fulfilled without the need for computers. All that computing devices provided was an ancillary support to an organization’s framework. Today, digital technology has completely upturned business processes and made them more efficient and effective, enabling us to extract greater productivity in significantly shorter durations of time…Read more

It-Security-Middle-East-Africa

AI Powers Cyber Security

Security MEA speaks with Rajat Mohanty, Co-founder and Chief Executive Officer at Paladion on the role that artificial intelligence plays in cyber defense and the challenges that need to be overcome to stay ahead of attackers.

Today, the reality is that organizations are facing cyber threats that move too quickly. Security teams that depend on rules, correlation and signatures are ill equipped to handle the speed and velocity of such attacks…Read more

It-Security-Middle-East-Africa

AI Powers Cyber Security

Security MEA speaks with Rajat Mohanty, Co-founder and Chief Executive Officer at Paladion on the role that artificial intelligence plays in cyber defense and the challenges that need to be overcome to stay ahead of attackers.

Today, the reality is that organizations are facing cyber threats that move too quickly. Security teams that depend on rules, correlation and signatures are ill equipped to handle the speed and velocity of such attacks…Read more

Why Data Breaches have become regular news, and how to actively prevent them

The primary reason cyber defenses are failing is the dependence on preventive defense. No organization can prevent a breach at all costs; regardless of how sophisticated their security technologies are. So, the focus should shift from a preventive approach to a hunting approach.

This year, 1.34 billion email accounts were compromised, and their information stolen when River City Media suffered a devastating data leak. The revealed information included actual names, user IP addresses, and physical addresses, besides email account information…Read more

Why Data Breaches have become regular news, and how to actively prevent them

The primary reason cyber defenses are failing is the dependence on preventive defense. No organization can prevent a breach at all costs; regardless of how sophisticated their security technologies are. So, the focus should shift from a preventive approach to a hunting approach.

This year, 1.34 billion email accounts were compromised, and their information stolen when River City Media suffered a devastating data leak. The revealed information included actual names, user IP addresses, and physical addresses, besides email account information…Read more

How blockchain technology is changing the security landscape in the banking sector

Blockchain, the technology that’s used in the popular cryptocurrency ‘Bitcoin’, is revolutionary in many ways. It addresses multiple challenges associated with digital transactions, such as double spending and currency reproduction.

Employing blockchain also reduces the cost of online transactions while simultaneously increasing authenticity and security. The upshot is that the need for payment processors, custodians, and reconciliation bodies is eliminated. These benefits are amongst the prime reasons why the technology is being extensively deployed within the banking sector…Read more

How blockchain technology is changing the security landscape in the banking sector

Blockchain, the technology that’s used in the popular cryptocurrency ‘Bitcoin’, is revolutionary in many ways. It addresses multiple challenges associated with digital transactions, such as double spending and currency reproduction.

Employing blockchain also reduces the cost of online transactions while simultaneously increasing authenticity and security. The upshot is that the need for payment processors, custodians, and reconciliation bodies is eliminated. These benefits are amongst the prime reasons why the technology is being extensively deployed within the banking sector…Read more

‘Ways to fix the security vulnerabilities around IoT’

IoT technology has emerged as one of the biggest game-changers in the global IT landscape. Its contribution is not merely limited to the IT sector, but it further expands from manufacturing to logistics operations, from smart wearables to sensors for endless use cases. Today, the technology has become the breeding ground for ultra modern phenomena including Industry 4.0, smart homes, and smart cities…Read more

‘Ways to fix the security vulnerabilities around IoT’

IoT technology has emerged as one of the biggest game-changers in the global IT landscape. Its contribution is not merely limited to the IT sector, but it further expands from manufacturing to logistics operations, from smart wearables to sensors for endless use cases. Today, the technology has become the breeding ground for ultra modern phenomena including Industry 4.0, smart homes, and smart cities…Read more

Digital India, ransomware, and the rise of cyber threats in the country

India’s rise as a digital power not only requires digital awareness among the burgeoning set of internet users, it also demands the strengthening of the IT infrastructure with regards to security. India is making a quantum leap into the digital realm by integrating the entire nation in the digital fabric. Today, digital services have facilitated the simplification of a number of day-to-day processes, including banking, verifications, entertainment, availing government-led services and researching about any desired product or service online…Read more

Digital India, ransomware, and the rise of cyber threats in the country

India’s rise as a digital power not only requires digital awareness among the burgeoning set of internet users, it also demands the strengthening of the IT infrastructure with regards to security. India is making a quantum leap into the digital realm by integrating the entire nation in the digital fabric. Today, digital services have facilitated the simplification of a number of day-to-day processes, including banking, verifications, entertainment, availing government-led services and researching about any desired product or service online…Read more

‘Ways to fix the security vulnerabilities around IoT’

IoT technology has emerged as one of the biggest game-changers in the global IT landscape. Its contribution is not merely limited to the IT sector, but it further expands from manufacturing to logistics operations, from smart wearables to sensors for endless use cases…Read more

‘Ways to fix the security vulnerabilities around IoT’

IoT technology has emerged as one of the biggest game-changers in the global IT landscape. Its contribution is not merely limited to the IT sector, but it further expands from manufacturing to logistics operations, from smart wearables to sensors for endless use cases…Read more

Cyber Threats Are the Biggest Risks to Business Operations

Digital technologies have unlocked unprecedented avenues in the current market landscape for businesses. Today, it is as easy for a business to tap customers in its neighborhood as doing so on the other side of the globe. But this change and blurring of global boundaries has come with its own expense; a threat that leaves all businesses exposed to wide-ranging digital implications round the clock, throughout the year…Read more

Cyber Threats Are the Biggest Risks to Business Operations

Digital technologies have unlocked unprecedented avenues in the current market landscape for businesses. Today, it is as easy for a business to tap customers in its neighborhood as doing so on the other side of the globe. But this change and blurring of global boundaries has come with its own expense; a threat that leaves all businesses exposed to wide-ranging digital implications round the clock, throughout the year…Read more