Cloud computing

DLP isn’t a disruptive force to company’s culture: Roman Foeckl, CoSoSys

DLP is quickly becoming a mandatory tool in the arsenal of IT departments says Roman Foeckl, Founder and CEO, CoSoSys.

What is single sign-on? How SSO improves security and the user experience

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

7 hot new IT jobs — and why they just might stick

From CIoTO to automation architect, new IT roles are rising to fill emerging needs. Some may fizzle, but others may have a long future thanks to underlying IT trends.

10 questions to ask when considering a cloud services provider's encryption solutions

Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.

Fortinet expands global Managed Security Service Provider program

The expansion is through its new Silver Level program tier, as well as new services enablement and technical support offerings.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

Top six security and risk management trends: Gartner

Analysts will explore the trends security leaders face during the Gartner Security & Risk Management Summit, September 10-11, 2018, London, U.K.

Privileged access is a critical pathway to all attacks: Jeffrey Kok, CyberArk

By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.

FireEye, Gigamon announces global partnership to enhance threat defences

The multifaceted alliance offers customers FireEye Network Security combined with the GigaSECURE Security Delivery Platform with flexible deployment options and scalability.

Amit Jaokar

At Choice International, Amit Jaokar led a Cloud based Identity and Access Manager (IdAM) solution to optimize information security and risk management, and achieve regulatory compliance faster. It reduced administrative costs by 20 percent, automated account management by 85 percent, reduced helpdesk calls by 90 percent, and reduced user on-boarding time by 75 percent.

Pawan Kumar Sharma

Pawan Kumar Sharma, as CISO at Tata Motors, is driven by his goal to align information technology with business to add maximum business value and realize maximum benefits in terms of process improvement, automation and cost optimization in the organization.

Fal Rameshchandra Ghancha

At Reliance Nippon Life Asset Management, Fal Rameshchandra Ghancha implemented a robust IdAM solution that fully automate the provisioning and de-provisioning of access rights of employees, partners, contractors, vendors, and guests—for critical applications hosted on the company's own data centers, private clouds, public clouds, or a hybrid combination of all these spaces.