Phishing

Shailendra Upadhyay

Shailendra Upadhyay has been in-charge of the implementation of SaaS (security-as-a-service) to identify any incident reported on the internet at any given point of time. He also helped deploy a centralized patch management solution that assists in managing all OS patches automatically. 

Sandeep Jamdagni

At Ashiana Housing, Sandeep Jamdagni, built a complete security system and policy to ensure users are aware of threats and the systems and networks are secure.

Bithal Bhardwaj

Led active engagements with industry influencers to help drive change in larger ecosystem for secure operating environment for the companies in the region.

Pavankumar Bolisetty

Pavankumar Bolisetty at WaveCrest Holdings helped implement a regulatory requirements and certifications on PCI DSS V 3.2, ISO 27001, ISO 9001, ISO 14001 compliance programs.

Amit Sharma

At Apollo Munich Health Insurance, Amit Sharma, implemented a Security Incident and Event Management (SIEM) system that could give real time threat alerts. 

F-Secure to acquire MWR InfoSecurity

The acquisition is a significant milestone in the execution of F-Secure’s growth strategy, and makes it the largest European single source of cyber security services and detection and response solutions.

AMP appoints data scientist to cyber team to meet ‘audacious’ target

Last year, AMP’s cyber team took a “fairly audacious target” to the board: bring down the number of cyber security vulnerabilities across the company by ten to 15 per cent every month.

Partner Content
The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Most big surveys reckon that human errors are at the heart of security incidents.

Partner Content
How hackers use spam to maximize the impact of a cyber attack?

‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services.

Partner Content
5 Critical corporate cybersecurity risks for SMBs

If you are the owner of a SMB, you cannot underestimate the importance of having a strong cybersecurity defence.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.