The most notorious hacker groups

Today increasingly sophisticated cyber attacks are crafted, honed, and improved by shady groups of hackers, often using custom tools that are directed at high value people, businesses, or even countries.

Meetali Sharma

Meetali Sharma conducted an internal risk assessment with respect to the security standards, identified gaps, and made numerous changes within the environment. This included physical segregation, VLAN segmentation, dual factor authentication, policy alignment, and employee trainings. 

Vijendra Singh Rawat

Dharampal Satyapal had requirement for a security solution which covers web content filtering, data leak prevention, employee forensics, employee productivity and behavior monitoring, enforced encryption on external devices such as USBs, external hard disk drives for all remote locations. The organization also had a challenge to address all this aspects of information security in single cloud solution to avoid extra bandwidth utilization between datacenter and remote locations. For this, DS implemented InDefend integrated Data Privacy solution.


Bhavesh Kumar

At Hero FinCorp, Bhavesh Kumar implemented tools for change and incident management. They are implementing DLP, IdAM and SIEM, and is also migrating from IPV4 to IPV6. 

Lucius Lobo

The advent of GDPR provided Tech Mahindra an opportunity to design, build and enforce increased trust across the entire organization and turn that into wider operational and business gains. The GDPR compliance program solution included implementation of data privacy and protection framework. Data privacy policy and framework were fine-tuned to adhere to global regulatory environment.  Mandatory training along with exams for Data Protection were designed and rolled out.

Partner Content
How cybersecurity laws play an important role in securing your organization

Over the last few years, the key buzzword has been cybersecurity, thanks to the number of breaches and vulnerabilities that have occurred.

Gemalto launches virtualized network encryption platform for evolving data security needs

New virtual appliance simplifies management and deployment while lowering cost of ownership to encrypt traffic across all network layers.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Software is the key enablement for defining security perimeter: Makarand Joshi, Citrix

Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.

Specialized channels is the mainstay of security game: Adel Eid, Sophos

Simplification, specialisation and scale are fundamental pillars accelerating our channel blueprint, says Adel Eid, APJ Channel Chief at Sophos.

Partner Content
Wake up call: Right time to secure your online data

According to investigations made by the American and the British media, Cambrige Analytica stole personal information from 50 million Facebook user profiles. 

Partner Content
GDPR has arrived: Check your preparedness

Organizations across the world are scrambling to ensure they are in compliance with the GDPR regulations. Has your company done its due diligence?