Identity Management

Software is the key enablement for defining security perimeter: Makarand Joshi, Citrix

Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.

Specialized channels is the mainstay of security game: Adel Eid, Sophos

Simplification, specialisation and scale are fundamental pillars accelerating our channel blueprint, says Adel Eid, APJ Channel Chief at Sophos.

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.

GDPR is here. Are you ready?

Regulators will begin enforcing the European Union's General Data Protection Regulation on May 25. Here are steps you can take to make sure your compliance program is ready.

What is a Chief Security Officer? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

Ripple invests $25m in Blockchain Capital’s latest fund

XRP investment will be used to spur innovation in the blockchain and digital asset space. Blockchain Capital is the first fund dedicated solely to the blockchain space and is also the first to accept capital calls in digital assets.

MS Office vulnerabilities, unexplained outage puts Microsoft in a tough spot

The biggest software company in the world, Microsoft has had a rough month with significant spikes in targeted malware attacks and an out-of-the-blue Office 365 outage that threw enterprises out of gear all over the globe. 

Blockchain: The growth-driving technology

A recent World Economic Forum report predicts that by 2025, 10 percent of GDP will be stored on blockchains or blockchain-related technology. The potential of blockchain technology is certain to be realized in a world where data protection and verification is of such high importance.

Data Privacy: How you can mitigate violation

In this edition of Explained, we explore the serious need for users to be vigilant and vary while giving away their personal data, post the Aadhaar breach and Facebook-Cambridge Analytica expose.

 

Script edited by Shantheri Mallaya

Post production by Kshitish

Voice Over by Soumik Ghosh

 

In the face of rampant threats, learn, implement and adapt: S Srikanth, TVS Motor

People need to understand the business and reputational impact of a data breach, says S. Srikanth, head of information security at TVS Motor Company.

Partner Content
Businesses under pressure - Employees want same simple access to cloud applications as consumers, finds Gemalt

70 percent believe that authentication methods applied in the consumer world can be applied to secure access to enterprise resources.

The great privacy debacle: Congress, BJP find themselves a common adversary

Here's how both BJP and Congress dropped the ball in the data privacy game