As IT and OT systems converge with the adoption of Industry 4.0, the security risk to OT systems and IoT devices is high. To secure the enterprise, organizations need network segmentation tools to scan for malicious content across the OT environment, says Ivan Issac of OPSWAT.
Zero Trust presents a significant change to traditional enterprise architectures, where a "trust but verify" model sufficed prior to digital transformation initiatives and pervasive cloud adoption. Today, the primary goal of Zero Trust in the SOC is the continued audit and maintenance of a strong security...
One of the biggest challenges facing healthcare providers like Penn State Health is that cyber security threats are always evolving. Threat actors are becoming increasingly sophisticated, continually finding new vulnerabilities and new ways to exploit them.
Download this case study to learn how to:
Keep ahead of the...
Summa Equity bought a majority stake in Logpoint to help the security operations firm expand in areas such as automation, detection and response, and attack surface management. The sustainable growth fund says the acquisition will allow the company to acquire technologies in adjacent areas.
Global network infrastructures have never felt more vulnerable than in the past few years as threats keep increasing.
This perfect storm – threat actors embracing their own versions of digital transformation, exposed threat vectors from a surge in remote access, and record cryptocurrency prices fueling the...
How XDR is impacting SecOps professionals today, and into the future.
Cybersecurity's latest hot topic, XDR or Extended Detection and Response, is filled with promises and questions alike.
At Cisco, we wanted to get an independent view of what XDR means to a security operations audience, so we partnered with...
The exponential thrust in digitization has all organizations adopting new technology as the Threat Landscape in India is growing at much faster pace. The recent Ransomware attacks in India has only taught us cybercriminals in 2023 will only be fine tuning their methods.
To curb the rising number of cyber security...
According to the Forrester Wave issued in December 2022, the top challenge security analytics vendors face when bringing SIEM, SOAR and UEBA together is making it easy for customers to manage and maintain the offering, says Forrester analyst Allie Mellen.
The founding team behind SOAR vendor Demisto has started a passwordless authentication and user management platform company that caters to the developer community. Descope helps developers embed authentication in the application build process and competes with Auth0 in the CIAM space.
Please join us for our Prisma Cloud Security Briefing to learn how Palo Alto Networks Prisma® Cloud can enable your organization to secure multicloud, hybrid and microservice environments with a single tool.
Prisma® Cloud is the industry’s most comprehensive cloud-native application protection platform(CNAPP)...
The latest edition of the ISMG Security Report analyzes why Meta has agreed to pay $725 million to settle a class-action lawsuit over users' personal data, how the median stock price dropped 40% among publicly traded security firms in 2022, and why an infrastructure change is needed in SOCs.
As organizations look to consolidate security portfolios to reduce cost, the question in the minds of most CISOs is: How can I do more with less? Iftekhar Hussain, principal product manager, cyber threat hunting with Microsoft India, discusses how to use AI and fewer tools to avoid manual work.
"Technologies like...
CISOs today are dealing with many kinds of attacks, and the volume of activity is overwhelming employees in the security operations center, potentially leaving the enterprise open to breaches, says Manish Sinha, director of sales engineering at Trellix.
When it comes to advanced threat response, most financial institutions say their current abilities are average. Only one-third say automation is crucial to how they identify and respond to threats. This ebook is developed from a recent survey & related panel discussion of APAC and ANZ experts who analyze the state of...
SOC has long been the eyes and ears of cybersecurity professionals. It has reached the point where the presence of an enterprise scale SOC has become nearly ubiquitous at large organizations.
The question to ask now is - How do we evolve the existing capabilities within our ever present SOCs to match the rapidly...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.