Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.
Simplification, specialisation and scale are fundamental pillars accelerating our channel blueprint, says Adel Eid, APJ Channel Chief at Sophos.
Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.
Regulators will begin enforcing the European Union's General Data Protection Regulation on May 25. Here are steps you can take to make sure your compliance program is ready.
The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.
XRP investment will be used to spur innovation in the blockchain and digital asset space. Blockchain Capital is the first fund dedicated solely to the blockchain space and is also the first to accept capital calls in digital assets.
The biggest software company in the world, Microsoft has had a rough month with significant spikes in targeted malware attacks and an out-of-the-blue Office 365 outage that threw enterprises out of gear all over the globe.
A recent World Economic Forum report predicts that by 2025, 10 percent of GDP will be stored on blockchains or blockchain-related technology. The potential of blockchain technology is certain to be realized in a world where data protection and verification is of such high importance.
In this edition of Explained, we explore the serious need for users to be vigilant and vary while giving away their personal data, post the Aadhaar breach and Facebook-Cambridge Analytica expose.
Script edited by Shantheri Mallaya
Post production by Kshitish
Voice Over by Soumik Ghosh
People need to understand the business and reputational impact of a data breach, says S. Srikanth, head of information security at TVS Motor Company.
70 percent believe that authentication methods applied in the consumer world can be applied to secure access to enterprise resources.