Online security

Bitdefender unveils new 2019 product line

Bitdefender launches its 2019 consumer security product line, which aims to stop criminals before they attack.

10 questions to ask when considering a cloud services provider's encryption solutions

Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

Partner Content
Fabtech India ensures endpoint protection and secure network access with Seqrite EPS

"We have considered Seqrite EPS after a deep scrutiny. It offers a range of attractive features including secured IT policies with easy usability and manageability. Seqrite EPS clearly met our expectations in numerous categories."

Partner Content
Threats posed by portable storage devices

Organizations where portable devices are used or allowed often ignore the threats posed by such devices. This white paper will examine the nature of threats that organizations may have to face due to portable devices and as a counterpart to these threats how organizations can eliminate them.

Partner Content
How to identify, prevent and recover from cryptojacking attacks

Cryptojacking is a sneaky but extremely effective way for hackers to get their desired results in exactly the surreptitious, stealthy way they desire.

Privileged access is a critical pathway to all attacks: Jeffrey Kok, CyberArk

By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.

Sophisticated attacks go undetected with traditional security solutions: CrowdStrike

Speaking at IDG Security Day & CSO 100 Awards 2018, Ramanand Kambli and Satbir Singh from CrowdStrike highlighted how attacks are getting sophisticated, and how enterprises can address all security challenges with their cloud-based offering. 

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Regulation is key for blockchain adoption in Indian enterprise, say security leaders

India's BFSI cybersecurity leaders discuss the enterprise prospects of blockchain technology, at the IDG Security Day and CSO100 Awards in Faridabad.

Ramesh Menon

At Aegis Customer Support Services, Ramesh Menon’s team developed online security training portals for its users, and initiated advanced threat protection and end point security for clients.

Debojit Maitra

Debojit Maitra introduced all level protection Aditya Birla Fashion and Retail. He has implemented various security measures such as datacenter protection, servers and application protection, implemented Machine Learning and Deep Learning in perimeter and gateway level network, adequate measures in web & email security, BYOD device and end point protection and detection that would protect their digital systems from malicious Intruders of all sorts.