
Meltdown and Spectre CPU Vulnerabilities and its Remediation
Researchers from Google and the research community have independently discovered one hardware vulnerability each, that focus on a flaw in the CPU. If this flaw is taken advantage of,…
Read More

Web Application Security Guidelines: Protect your Application from Threats and Hacking
Research estimates that 75% of attacks against Web servers are entering through applications and not at the network level. And when a company makes even minor changes on its websites…
Read More

Gartner Predicts Growth in Investment in Information Security Services
Gartner has predicted that worldwide information security spending will witness a growth of 7% in 2017, with the total amount spent reaching close to $93 billion in 2018.
Read More

10 tips that will help protect your system against Ransomware
A massive global ransomware attack has struck hospitals, companies and government offices around the world, seizing control of affected computers until the victims pay a ransom. Majority of the attacks…