Ajay Kumar

Opinions expressed by ICN authors are their own.

Ajay Kumar is an information security and risk management consultant with more than 15 years of experience in various industries. Ajay has predominantly worked on initiatives involving enterprise mobile security, cybersecurity, data protection and privacy, security operations, security analytics and identity and access management.

The opinions expressed in this blog are those of Ajay Kumar and do not necessarily represent those of IDG Communications Inc., or its parent, subsidiary or affiliated companies.

The change in hacker tactics – and security technologies to thwart them

How to protect sensitive data and limit risk of data exposure or leaks?

How to protect sensitive data and limit risk of data exposure or leaks?

The average cost per record is $158 whereas the cost per record breached ranges from $355 to $129 for healthcare and retail industry respectively. Despite the high risk of the threat, enterprises continue to fall victim to data...

A look back to 2016 and what to expect in 2017 in cybersecurity space

A look back to 2016 and what to expect in 2017 in cybersecurity space

The world of digital information security does not lack for challenges. Major events that have happened in 2016 have created uncertainty about the future and at the same time new opportunities for the security industry to think and...

The unlimited potential of IoT and security challenges

The unlimited potential of IoT and security challenges

IoT security has not been up to date with the rapid pace of innovation and adoption creating substantial safety, privacy and economic risks.

Fasten your seatbelt in the IoT cybersecurity race

Fasten your seatbelt in the IoT cybersecurity race

To address the magnitude of the problem, industry groups, vendors and government bodies need to start and accelerate developing a unified principle and framework around IoT security challenges, and outline the issues to pull in the...

What have we learned from the Yahoo breach?

What have we learned from the Yahoo breach?

The progressive organization represents the highest level of cybersecurity maturity and these organizations share several key qualities that help them to rise to the top when it comes to being prepared in today’s cybersecurity threat...

Are you ready to make the move to public cloud securely to leverage its benefits?

Are you ready to make the move to public cloud securely to leverage its benefits?

In the next wave of digital transformation, cloud computing can provide huge benefits to enterprises as compute cost goes down to drive down the cost of IT for organizations. At the same time, cloud features such as agility,...

CASB can help address gaps in cyber security

The emerging and fast growing segment of cloud security is the Cloud Access Security Broker (CASB) and can help enterprises solve today's cyber security challenges to a great extent.

Pokémon Go's strategy could thwart cybersecurity threats

Pokémon Go's strategy could thwart cybersecurity threats

Today, targeted hackers are ahead in the game of cybersecurity and winning too often by circumventing even layered defense systems of enterprises fenced with latest and greatest technologies. Therefore, organizations are going with...

Enhancing cyber security by implementing a robust threat and vulnerability management program

Enhancing cyber security by implementing a robust threat and vulnerability management program

Most recent attacks exploit known vulnerabilities for which a patch or mitigating control was available. This makes vulnerability management a strategic component of any advanced threat defense strategy, providing benefits at multiple...

Data protection strategy for mobile devices

Data protection strategy for mobile devices

So the question remains unanswered, what sort of technology can enterprises include in their data protection strategy to prevent data loss from mobile devices and what are the solutions available today to address these challenges.

Risk of mobile threats and privacy concerns grow

Risk of mobile threats and privacy concerns grow

Recent research shows that more than 50 percent of enterprises have at least one non-compliant device at any time. Having these devices being compromised could be a steppingstone for cybercriminals to compromise the enterprise...

Load More