Ajay Kumar is an information security and risk management consultant with more than 15 years of experience in various industries. Ajay has predominantly worked on initiatives involving enterprise mobile security, cybersecurity, data protection and privacy, security operations, security analytics and identity and access management.
The opinions expressed in this blog are those of Ajay Kumar and do not necessarily represent those of IDG Communications Inc., or its parent, subsidiary or affiliated companies.
The real challenges in front of security professionals are the evolution and innovation of threats, and changes in the behavior of attacker’s tactics.
IoT security has not been up to date with the rapid pace of innovation and adoption creating substantial safety, privacy and economic risks
What level of preparedness is your organization able to perform today?
Customer perception still exists today with respect to using public cloud capabilities and enterprises struggle to make the right decision toward moving into the public cloud.
CASB use can significantly increase cloud service adoption and enterprise mobility.
Specific motivations behind any targeted hack make them successful to win the game against organization’s layered defense systems no matter what sort of technology or threat intelligence that the organization uses
Vulnerability management is a strategic component of any advanced threat defense strategy, providing benefits at multiple layers of a defense-in-depth security architecture
Sponsored Links