Integrated risk management and compliance offerings are moving to the cloud in a significant way to keep pace with digital transformation, says Vasant Balasubramanian of ServiceNow.
As enterprises adopt IoT products, they have to make sure that security is part of the design from the beginning and implement microsegmentation, says Dr. Neena Pahuja, former director general of India's Education & Research Network, or ERNET.
Integration and orchestration are critical components of managing risk, says Nik Whitfield, CEO of Panaseer, who discusses the importance of visibility.
Highly secure, high-assurance cryptography is required to securely remotely manage autonomous vehicles and internet of things device, says Peter Galvin of nCipher.
Quarantines, lockdowns, supply chain disruptions and the biggest remote workforce in history. These all part of the "new normal" in the shadow of the COVID-19 pandemic. Business continuity expert Regina Phelps has some new advice for how businesses and individuals should approach the next crucial weeks.
With increasing demands on healthcare organizations to quickly accommodate a surge of teleworking employees as a result of the COVID-19 pandemic, IT and information security departments need to exercise security vigilance, says former healthcare CIO Drex DeFord.
While CIOs are leading digital transformation projects designed to meet the needs of businesses, CISOs are seeking tighter controls because these projects open up new risks and increase the attack surface, says Zscaler's Sudip Banerjee, who offers a way to strike a balance.
As a result of the COVID-19 outbreak, cybercriminals increasingly are targeting organizations that now have more remote workers and fewer IT and security staff at the ready to mitigate hacker attacks and intrusions, security experts say.
Attackers are continuing to use concerns over COVID-19 to distribute ransomware and malware, including for smartphones. The healthcare sector is perhaps at the greatest risk from these attacks because it's serving as the front-line defense against the disease.
As organizations plot their 2020 cybersecurity strategies, especially in light of privacy regulations, key data governance challenges are emerging. What are the critical issues, and how are they being addressed?
An unsecured Amazon Web Services S3 bucket left 425 GB of financial data, including credit reports, bank statements and more, exposed to the internet, according to a VPN Mentor researcher.
Because so many organizations and government agencies are functioning in silos, a key component to India's soon to be finalized cybersecurity policy is the creation of an interministerial task force to respond to growing threats, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.
With U.S. stock markets suffering their worst day since 1987 on Monday, most technology firms took a hit as Wall Street continues to be rattled by the COVID-19 crisis. Experts predict this will drive fresh waves of consolidation and M&A in the cybersecurity market, as well as growth in hot areas.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.