Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.
Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.
"We have considered Seqrite EPS after a deep scrutiny. It offers a range of attractive features including secured IT policies with easy usability and manageability. Seqrite EPS clearly met our expectations in numerous categories."
Organizations where portable devices are used or allowed often ignore the threats posed by such devices. This white paper will examine the nature of threats that organizations may have to face due to portable devices and as a counterpart to these threats how organizations can eliminate them.
Cryptojacking is a sneaky but extremely effective way for hackers to get their desired results in exactly the surreptitious, stealthy way they desire.
By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.
Speaking at IDG Security Day & CSO 100 Awards 2018, Ramanand Kambli and Satbir Singh from CrowdStrike highlighted how attacks are getting sophisticated, and how enterprises can address all security challenges with their cloud-based offering.
India's BFSI cybersecurity leaders discuss the enterprise prospects of blockchain technology, at the IDG Security Day and CSO100 Awards in Faridabad.
At Aegis Customer Support Services, Ramesh Menon’s team developed online security training portals for its users, and initiated advanced threat protection and end point security for clients.
Debojit Maitra introduced all level protection Aditya Birla Fashion and Retail. He has implemented various security measures such as datacenter protection, servers and application protection, implemented Machine Learning and Deep Learning in perimeter and gateway level network, adequate measures in web & email security, BYOD device and end point protection and detection that would protect their digital systems from malicious Intruders of all sorts.