Opinions

secure system / network security policy management
venkat krishnapur 1200x800

rajnish gupta rsa 1200x800

Businesses must focus on digital risk management : Rajnish Gupta, RSA

Digital risk is a new form of risk and is larger than the security or cyber risks we faced earlier, says Rajnish Gupta, Regional Director–India & SAARC, RSA (A Dell Technologies Company).

anil bhasin 1200x800

Big data analytics, AI and blockchain can help reclaim surrendered ground: Anil Bhasin, Palo Alto Networks

We generally assume that all threats are ‘information stealing’ in nature. But that has changed, and the threats have become multi-faceted, points out Anil Bhasin, regional vice president, India & SAARC, Palo Alto Networks.

vaidyanathan iyer1200x80

A cognitive SOC can help determine threats which are applicable to you: Vaidyanathan Iyer, IBM India/South Asia

The man spearheading IBM’s security business in India and South Asia, Vaidyanathan Iyer, believes a strong incident response and business continuity plan is imperative in today's threat environment.

surendra singh 1200x800

Critical enterprise and govt data will be the new oil: Surendra Singh, Forcepoint

The time has come for shifting the paradigm from protecting infrastructure to understanding the behavior of users, says Surendra Singh, Senior Director and Country Manager at Forcepoint.

shrikant shitole 1200x800

Enterprises should invest in people and build cyber threat-hunting practices: Shrikant Shitole, FireEye

Cybersecurity in the new age enterprise doesn’t end at merely preventing attacks. CISOs need to be able to predict the time of an attack, who is behind the attack, and what is the motive of the attacker. Shrikant Shitole, Senior...

rajesh maurya fortinet 1200x800

Automated threat intelligence is a valuable tool against attack vectors: Rajesh Maurya, Fortinet

Automated, actionable threat intelligence shared at speed and scale shrinks the necessary windows of detection. It is able to trace and intervene against attack workflows that move between network ecosystems and provides the automated...

ransomware healthcare breach hacker

Have you been ransomware’d yet?

You need to understand why this is one of the most potent attacks – what you must do to avoid becoming a target.

cyber security lock padlock firewall code breach password

Why Indian firms need to embrace the ‘Disaster and Recovery’ approach sooner

Leaving risk undressed can have dire consequences, as technology is now the foundation of the business, any disruption in the technology also disrupts the business.

edgar dias 1200x800

Adopt a ‘trust, but verify’ approach for a zero trust security environment: Edgar Dias, F5 Networks

With enterprises using digital platforms to engage better with customers, opening digital assets to potential and new customers creates a whole new bunch of security challenges. Edgar Dias, MD, India at F5 Networks, tells us how CSOs...

prasad mandava akamai 1200x800

Security and business are intertwined: Prasad Mandava, Akamai India

According to Prasad Mandava, Managing Director & VP of Engineering-India at Akamai Technologies, business risk and security risk are inherently proportional to each other today and can’t exist independently of one another.

bhaskar bakthavatsalu check point 1200x800

Indian enterprises are highly exposed to advanced cyber threats: Bhaskar Bakthavatsalu, Check Point

Today, the vast majority of enterprises in India are only protected against Gen I to III threats-viruses, networks and applications and they remain exposed to advanced cyber threats, says Bhaskar Bakthavatsalu, Managing Director,...

cybersecurity eye with binary face recognition abstract eye

Why cybersecurity is a central ingredient in evolving digital business models

Rather than being a hindrance, cybersecurity best practices give you a stable foundation on which to innovate...and can be the can be the gateway to re-imagining your business model.

BlueBorne Bluetooth attack stage fright

Are you being tracked through a Bluetooth security vulnerability?

The Bluetooth protocol, which was never that secure to begin with, now allows the bad guys to track your location on some laptops and phones, but worse could be the entry it offers into the IoT.

fedora hat black hat detective spy

The best and worst of Black Hat 2019

Security rock stars? Fake science? This year's Black Hat had it all.

Let's Encrypt automated encryption gears

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.

Las Vegas Sign for Blackhat DefCon Event

Thoughts from Defcon 27 – This is why I do what I do

Every year, thousands of security professionals descend upon Las Vegas to take part in a series of conferences known as Hacker Summer Camp. This year, Black Hat, BSides Las Vegas, Defcon 27 and the Diana Initiative took up the...

Mastery of technology skills + knowledge.

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

Conceptual image of a network of executives / silhouettes of executives in motion.

Staffing the CISO office: A call to senior management for some expansive thinking

More companies need to realize that an inherent staffing misalignment around their CISO role presents potentially critical exposure to the organization.

Load More