From CIoTO to automation architect, new IT roles are rising to fill emerging needs. Some may fizzle, but others may have a long future thanks to underlying IT trends.
Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.
At NSE IT, Chinmay Shrikant Pradhan led implementation of advanced cybersecurity offerings, covering a range of technologies to validate data across applications and processes, along with media management.
Debojit Maitra introduced all level protection Aditya Birla Fashion and Retail. He has implemented various security measures such as datacenter protection, servers and application protection, implemented Machine Learning and Deep Learning in perimeter and gateway level network, adequate measures in web & email security, BYOD device and end point protection and detection that would protect their digital systems from malicious Intruders of all sorts.
Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.
The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.
Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?
Smart security cameras manufactured by global brand Hanwha Techwin have been discovered to be vulnerable to remote attacks, exposing even the other devices on the network to security threats.
Kroll, a corporate investigations and risk consulting firm based in the US, has published its 10th annual Global Fraud & Risk Report. The survey conducted among business executives across the globe has reported higher rate of fraud incidents in India when compared to the global average.
APT37, popularly known as Reaper has been primarily targeting the chemicals, electronics, manufacturing, aerospace, automotive, and healthcare industries for North Korean state interests.