
Meltdown and Spectre CPU Vulnerabilities and its Remediation
Researchers from Google and the research community have independently discovered one hardware vulnerability each, that focus on a flaw in the CPU. If this flaw is taken advantage of,…
Read More

Serverless Architecture Set to Redefine Business Computing
Serverless is a highly trending term in the world of software architecture right now and one can judge this from the many references of the term in journals, products, and…
Read More

Web Application Security Guidelines: Protect your Application from Threats and Hacking
Research estimates that 75% of attacks against Web servers are entering through applications and not at the network level. And when a company makes even minor changes on its websites…
Read More

Gartner Predicts Growth in Investment in Information Security Services
Gartner has predicted that worldwide information security spending will witness a growth of 7% in 2017, with the total amount spent reaching close to $93 billion in 2018.
Read More

10 tips that will help protect your system against Ransomware
A massive global ransomware attack has struck hospitals, companies and government offices around the world, seizing control of affected computers until the victims pay a ransom. Majority of the attacks…