Over the past few years, the landscape of cybersecurity has undergone significant changes, marked by the emergence of new threats and technologies, as well as the obsolescence of old ones. In today'...
Apr 14, 2023
A recent study by Fortinet highlights that the shortage of cybersecurity skills is causing critical IT positions to remain unfilled, which in turn is increasing the cyber risks for organizations,...
Apr 04, 2023
Distributed Denial of Service (DDoS) attacks have been around for over 20 years, and due to that, most organizations have some form of protection in place from DDoS attacks. However, legacy...
Mar 09, 2023
Chief Risk Officers often seek transformation programs that offer visibility and insights while these are getting implemented across the organization; hence instead of driving Cyber Security...
Jan 30, 2023
Cybersecurity is experiencing a fierce conflict between hackers and security experts as a result of the exponential growth in technology. On the other hand, tech-savvy criminals are upskilling...
Jan 18, 2023
In tech industries critical messages need to be repeated often. Sometimes they can be complicated, so we reach for analogies to make messaging, particularly around problem-solving, more relatable....
Nov 10, 2022
Before getting into data denudation; let’s first see, what is denudation? The meaning and the examples shared in this article will give you the detailed explanation about what the data denudation is...
Aug 22, 2022
As the emphasis on digital transformation has increased, the Zero Trust concept is increasingly gaining traction among enterprises, indicates a recent survey of nearly 1,500 IT decision makers and...
Aug 02, 2022
Appknox, a mobile security testing platform has recently conducted security research that revealed that more than 75% of the top 100 Indian Android apps contained critical security risks, which puts...
Jun 28, 2022
Ransomware is one of the top threats facing organizations and individuals today. In fact, according to a recent survey, 85% of organizations are more worried about a ransomware attack than any other...
Jun 16, 2022
Cyware, the industry’s leading provider of the technology platform to build Cyber Fusion Centers and automate Collective Defence, has rolled out its enhanced Cyware Threat Intelligence Exchange (CTIX...
Jun 09, 2022
The pandemic has turned into a catalyst for transformation in enterprises across sectors. Indian organizations are continuously learning to adapt to the new realities of working. However, they still...
Jun 09, 2022
Cloud security solutions provider Akamai has revealed three new research reports today at the RSA Conference 2022. These in-depth reports focus on three of the most critical areas of web security:...
Jun 09, 2022
CIO&Leader & VMWare with DigitalTrack brought together the leading CISOs in a Digital Roundtable to discuss the way forward. Let’s hear out from the experts the challenges confronting...
Mar 01, 2022
CIO&Leader & VMware with Esconet brought together the leading CISOs in a Digital Roundtable to discuss the way forward. Let’s hear out from the experts the challenges confronting security...
Mar 01, 2022
The global cyber security market size is anticipated to reach USD 366.10 billion by 2028 and exhibit a CAGR of 12.0% during the forecast period. The surging number of e-commerce platforms and the...
Jan 06, 2022
As the reliance on technology has grown, no business can achieve organizational objectives without a full arsenal of enterprise platforms and applications. Having the right tools enables your teams...
Jan 04, 2022
Data security, confidentiality, integrity, and availability are now key issues for all organizations, as is the imperative to use data ethically while complying with a complex web of industry and...
Jan 03, 2022
At least 30% of critical infrastructure organizations will experience a security breach by 2025, which will most likely result in the halting of an operations- or mission-critical cyber-physical...
Dec 09, 2021
Akamai Technologies has announced the launch of App & API Protector, the company’s next-generation web application and API protection (WAAP) solution. It provides a holistic set of robust...
Nov 11, 2021
IT executives see the talent shortage as the most significant adoption barrier to 64% of emerging technologies, compared with just 4% in 2020, according to a new survey from Gartner. A lack of...
Sep 16, 2021
A K Capital Services seamlessly integrates security across its network, branches, hybrid cloud and remote workers
A K Capital Services, one of India’s most trusted bond houses, has seamlessly integrated security across its network, branches, hybrid cloud and remote workers. The organization has done the...
Jul 05, 2021
There is a significant breakdown in collaboration between two of the central components of the IT team: networking and security, according to Netskope’s research. While 49% of security teams and 44%...
May 10, 2021
CIOs and IT decision makers (ITDMs) are looking to maximize investments and drive innovation after a difficult year which raised the profile of IT leaders in driving critical workplace innovation,...
Mar 24, 2021
The COVID-19 pandemic will not hold back data priorities this year, but rather add to organizations’ urgency and drive additional investment, according to ibi’s Data and Analytics Trends and...
Feb 04, 2021
While most organizations today are using cloud-native apps, Kubernetes and microservices, they struggle to secure and connect the complex environments resulting from them, according to Volterra-...
Dec 22, 2020
Developer productivity and collaboration in open source improves in 2020, according to GitHub’s State of the Octoverse report. The report provides a detailed look at the developer and open source...
Dec 03, 2020
Evalueserve aims to automate its data protection processes and securely encrypt backup copies and rapidly restore them, even in case of any ransomware attack. For this, the company has adopted...
Nov 24, 2020
72% of respondents revealed that the number of digital assets have grown over the past 12 months, according to a FotoWare research. The three main types of digital assets being managed are images (95...
Oct 28, 2020
The financial services sector is experiencing significant commercial disruption coupled with rapid innovation as established institutions strive to become more agile and meet evolving customer demand...
Sep 23, 2020
The National Health Authority has come out with a draft National Health Data Management Policy which proposes to create a 'digital health id' for all citizens so an individual's personal health...
Sep 08, 2020
Bring your own PC (BYOPC) security will reach mainstream adoption in the next two to five years, while it will take five to 10 years for mainstream adoption of secure access service edge (SASE) to...
Aug 27, 2020
More than 90% of business leaders say cloud is a priority in the COVID-19 shutdown. They are relying more on cloud technologies but are seeing more cybersecurity attacks. Half a year into the...
Aug 21, 2020
Software-defined wide-area networking (SD-WAN) is rapidly replacing the traditional WAN for remote office and branch deployments. SD-WAN was designed to provide a wide range of benefits to support...
Aug 10, 2020
Julius Caesar is a play by William Shakespeare; in it, there is a famous phrase that is often quoted, "Beware of the Ides of March." Apparently, Caesar was warned about the Ides, which falls on March...
Jul 30, 2020
Maintaining business continuity with proper IT infrastructure and security tools a challenge for IT pros during COVID-19 crisis
The COVID-19 crisis led countries and organizations to shut down physical offices and move operations online. This was not easy as IT professionals and departments needed to maintain business...
Jul 29, 2020
Risk Management is undergoing an evolution as we respond, reimagine and reform the operating model. At the forefront of enabling the new ways of operating, lie employee safety and ability to provide...
Jul 21, 2020
It took some time but by now, most of us have accepted the new reality, that is, living life with COVID-19. This year’s pandemic has put the entire world to a standstill and forced organizations to...
Jun 17, 2020
Most companies see strong business drivers to adopt IoT as part of a broader digital transformation process, according to Syniverse-Omdia study. Improved efficiency and productivity, improved product...
Jun 02, 2020
While adoption rates for public cloud continue to grow, security is still the number one roadblock, which is understandable considering the volume and variety of threats organizations face today,...
Feb 21, 2020
Vikas Arora has been appointed as the Global SVP for IT & Security at ITWP Group of Companies including Toluna, Harris Interactive and KuRunData. Prior to this, he was VP - Global IT &...
Feb 10, 2020
Modern applications are difficult to secure. Whether they are web or mobile, custom developed or SaaS-based, applications are now scattered across different platforms and frameworks. To accelerate...
Dec 12, 2019
Zscaler, the leader in cloud security, today announced that Zscaler Private Access (ZPA) is the first zero trust architecture to achieve Amazon Web Service (AWS) Security Competency status. The ZPA...
Oct 29, 2019
Akamai, the intelligent edge platform for securing and delivering digital experiences, recently announced enhancements focused on maximizing security, quality, and reliability from the cloud to the...
Oct 16, 2019
Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, recently announced that IndiGo, India’s largest airline, has deployed Fortinet Secure SD-WAN solution across its...
Sep 30, 2019
Internet users in Asia-Pacific want security and privacy guarantees for the Internet of Things (IoT) -- the rapidly expanding network of devices, physical objects, services and applications that...
Sep 30, 2019
Cybersecurity issues are increasingly becoming a concern in merger and acquisition (M&A) deals, shows a new research report. The study conducted by Forescout suggests that IT and business...
Jul 08, 2019
Trend Micro, a global leader in cybersecurity solutions, today announced it has blocked 5 million attempted cyberattacks against IP cameras in just five months. Through its strategic partnership with...
Jun 28, 2019
Security leaders need to leverage the automation continuum to create new value for their organizations: Gartner
Leveraging the automation continuum is security and risk management leaders’ latest imperative in creating and preserving value at their organization, according to Gartner. Katell Thielemann,...
Jun 20, 2019
Recently, a new class of Intel CPU vulnerabilities was published by the microchip giant. Known as speculative execution side-channel vulnerabilities, they affect almost every Intel processor produced...
May 29, 2019