10 questions to ask when considering a cloud services provider's encryption solutions

Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

What is corporate espionage? Inside the murky world of private spying

Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.

Milind Nanal

At Volkswagen India, Milind Nanal performed implementation of redundant appliances threat prevention subscription in order to replace the installed perimeter firewall. A separate firewall was established for internal segmentation and production network. This led to cost benefits and freed up significant bandwidth for the organization.

Bhavesh Kumar

At Hero FinCorp, Bhavesh Kumar implemented tools for change and incident management. They are implementing DLP, IdAM and SIEM, and is also migrating from IPV4 to IPV6. 

Pavankumar Bolisetty

Pavankumar Bolisetty at WaveCrest Holdings helped implement a regulatory requirements and certifications on PCI DSS V 3.2, ISO 27001, ISO 9001, ISO 14001 compliance programs.

Krishna Dhumal

At the Gem and Jewellery Export Promotion Council, Krishna Dhumal implemented a business solution with integrated modules like forensics, advanced security analytics and cyber security monitoring. The company was able to generate cyber intelligence reports, in-depth forensics analysis, data leak prevention, and behavior analysis for each employee. 

Former Google, SoftBank exec Nikesh Arora named CEO of Palo Alto Networks

Nikesh Arora, formerly Chief Business Officer at Google and COO at SoftBank, replaced Mark McLaughlin as the CEO of cybersecurity giant Palo Alto Networks.

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.

7 risk mitigation strategies for the cloud

Cloud services — and the risks associated with them — will only become more critical over time. Here’s how to manage those risks without missing out on the benefits of the cloud.

What is blockchain? The most disruptive tech in decades

The distributed ledger technology, better known as blockchain, has the potential to eliminate huge amounts of record-keeping, save money and disrupt IT in ways not seen since the internet arrived.

5 top trends in endpoint security for 2018

Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as well.