secured network of computers with locks displayed on screens

Why giving users two separate systems won't improve security

Red/green systems, which give users one system for work and another for other tasks, no longer makes sense from a security and cost perspective. There are alternatives.

GDPR data privacy / data protection / security / risk management

What is personally identifiable information (PII)? How to protect it under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. That means keeping personally identifiable information (PII) safe. Here's what you need to know.


Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

How to avoid using RDP on Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it where possible. Here’s how.

access control / authentication / privileges / managing permissions

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.

venkat krishnapur 1200x800

Next big wave of innovation in cybersecurity solution is ML and AI: Venkat Krishnapur, McAfee India

If we were to summarize data breaches and infiltrations, the key causes usually are the 4 P’s: People, phishing, passwords and patching, says Venkat Krishnapur, Vice-President of Engineering and Managing Director, McAfee India.

rajnish gupta rsa 1200x800

Businesses must focus on digital risk management : Rajnish Gupta, RSA

Digital risk is a new form of risk and is larger than the security or cyber risks we faced earlier, says Rajnish Gupta, Regional Director–India & SAARC, RSA (A Dell Technologies Company).

anil bhasin 1200x800

Big data analytics, AI and blockchain can help reclaim surrendered ground: Anil Bhasin, Palo Alto Networks

We generally assume that all threats are ‘information stealing’ in nature. But that has changed, and the threats have become multi-faceted, points out Anil Bhasin, regional vice president, India & SAARC, Palo Alto Networks.

vaidyanathan iyer1200x80

A cognitive SOC can help determine threats which are applicable to you: Vaidyanathan Iyer, IBM India/South Asia

The man spearheading IBM’s security business in India and South Asia, Vaidyanathan Iyer, believes a strong incident response and business continuity plan is imperative in today's threat environment.

surendra singh 1200x800

Critical enterprise and govt data will be the new oil: Surendra Singh, Forcepoint

The time has come for shifting the paradigm from protecting infrastructure to understanding the behavior of users, says Surendra Singh, Senior Director and Country Manager at Forcepoint.


shrikant shitole 1200x800

Enterprises should invest in people and build cyber threat-hunting practices: Shrikant Shitole, FireEye

Cybersecurity in the new age enterprise doesn’t end at merely preventing attacks. CISOs need to be able to predict the time of an attack, who is behind the attack, and what is the motive of the attacker. Shrikant Shitole, Senior...

rajesh maurya fortinet 1200x800

Automated threat intelligence is a valuable tool against attack vectors: Rajesh Maurya, Fortinet

Automated, actionable threat intelligence shared at speed and scale shrinks the necessary windows of detection. It is able to trace and intervene against attack workflows that move between network ecosystems and provides the automated...

ransomware healthcare breach hacker
IDG Contributor Network

Have you been ransomware’d yet?

You need to understand why this is one of the most potent attacks – what you must do to avoid becoming a target.

ai artificial intelligence circuit board circuitry mother board nodes computer chips

5 questions Indian CISOs must answer before deploying AI for cybersecurity

India's top CISOs highlight the 5 most important points security leaders ought to bear in mind before deploying AI for cybersecurity.

woman on smartphone city network security leader iot

Imperative for Indian security leaders to leverage automation continuum: Gartner

Analysts to further discuss the role of automation in security and risk at the Gartner Security & Risk Management Summit 2019, August 26 -27 in Mumbai, India.