Soumik Ghosh

Principal Correspondent

India’s IT Act 2000 a toothless tiger?

CISO action plan to combat rising attacks on OT systems

CISO action plan to combat rising attacks on OT systems

Indian cybersecurity leaders discuss why OT systems are the weakest link in the chain and what can be done to plug the gap.

Thoma Bravo is on a cybersecurity acquisition spree; Sophos latest to be added to cart

Thoma Bravo is on a cybersecurity acquisition spree; Sophos latest to be added to cart

With five major-league cybersecurity players in its kitty already, Thoma Bravo has evolved into a formidable powerhouse in the enterprise security space.

Less than a fourth of Indian IT managers see supply chain as a security risk, and that’s worrying

Less than a fourth of Indian IT managers see supply chain as a security risk, and that’s worrying

A recent Sophos survey reveals that only 24 percent of Indian IT managers consider supply chain as a top security risk.

Organizations are not investing enough in managing digital risk: Atul Gupta, KPMG

Organizations are not investing enough in managing digital risk: Atul Gupta, KPMG

Digital Risk v/s Cyber Risk: Compared to cyber risk, companies are not spending enough on managing digital risk. KPMG's cybersecurity leader highlights the difference and why companies not investing adequately are walking on thin ice....

A cognitive SOC can help determine threats which are applicable to you: Vaidyanathan Iyer, IBM India/South Asia

A cognitive SOC can help determine threats which are applicable to you: Vaidyanathan Iyer, IBM India/South Asia

The man spearheading IBM’s security business in India and South Asia, Vaidyanathan Iyer, believes a strong incident response and business continuity plan is imperative in today's threat environment.

Enterprises should invest in people and build cyber threat-hunting practices: Shrikant Shitole, FireEye

Enterprises should invest in people and build cyber threat-hunting practices: Shrikant Shitole, FireEye

Cybersecurity in the new age enterprise doesn’t end at merely preventing attacks. CISOs need to be able to predict the time of an attack, who is behind the attack, and what is the motive of the attacker. Shrikant Shitole, Senior...

5 questions Indian CISOs must answer before deploying AI for cybersecurity

5 questions Indian CISOs must answer before deploying AI for cybersecurity

India's top CISOs highlight the 5 most important points security leaders ought to bear in mind before deploying AI for cybersecurity.

FaceApp sparks a frenzied witch hunt, but concerns around facial recognition valid

FaceApp sparks a frenzied witch hunt, but concerns around facial recognition valid

The vastly popular Russia-born FaceApp has the internet in a tizzy. The US, quick to sniff out a Russian conspiracy, is crying wolf over privacy concerns. It does have a point, though.

GDPR clocks over USD 294 million in penalties so far; British Airways latest on hit list

GDPR clocks over USD 294 million in penalties so far; British Airways latest on hit list

The tough-as-nails GDPR mandate has imposed its biggest penalty yet on British Airways.

Adopt a ‘trust, but verify’ approach for a zero trust security environment: Edgar Dias, F5 Networks

Adopt a ‘trust, but verify’ approach for a zero trust security environment: Edgar Dias, F5 Networks

With enterprises using digital platforms to engage better with customers, opening digital assets to potential and new customers creates a whole new bunch of security challenges. Edgar Dias, MD, India at F5 Networks, tells us how CSOs...

A cognitive SOC can help determine threats which are applicable to you: Vaidyanathan Iyer, IBM India/South Asia

The man spearheading IBM’s security business in India and South Asia, Vaidyanathan Iyer, believes a strong incident response and business continuity plan is imperative in today's threat environment.

Load More