Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.
At IDG Security Day, Jaspreet Singh, Partner – Cyber Security (Africa, India & Middle East) at EY, decodes GDPR and points out areas that could prove to be a challenge.
L&T Financial Services revamped the security architecture with multiple layer defense with proactive security monitoring that includes perimeter security, intrusion prevention system, web application security and endpoint security to ensure applications, computers, data, and network is defended from emerging cyber-threats, attack, unauthorized access or damage.
From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.
The companies are working closely to integrate their respective technological strengths to bring the first-of-their-kind smart USB devices to the global markets.
Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.
Simplification, specialisation and scale are fundamental pillars accelerating our channel blueprint, says Adel Eid, APJ Channel Chief at Sophos.
Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.
Regulators will begin enforcing the European Union's General Data Protection Regulation on May 25. Here are steps you can take to make sure your compliance program is ready.
The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.