Over the past few years, the landscape of cybersecurity has undergone significant changes, marked by the emergence of new threats and technologies, as well as the obsolescence of old ones. In today'...
Apr 14, 2023
A recent study by Fortinet highlights that the shortage of cybersecurity skills is causing critical IT positions to remain unfilled, which in turn is increasing the cyber risks for organizations,...
Apr 04, 2023
Distributed Denial of Service (DDoS) attacks have been around for over 20 years, and due to that, most organizations have some form of protection in place from DDoS attacks. However, legacy...
Mar 09, 2023
Chief Risk Officers often seek transformation programs that offer visibility and insights while these are getting implemented across the organization; hence instead of driving Cyber Security...
Jan 30, 2023
Cybersecurity is experiencing a fierce conflict between hackers and security experts as a result of the exponential growth in technology. On the other hand, tech-savvy criminals are upskilling...
Jan 18, 2023
In tech industries critical messages need to be repeated often. Sometimes they can be complicated, so we reach for analogies to make messaging, particularly around problem-solving, more relatable....
Nov 10, 2022
Appknox, a mobile security testing platform has recently conducted security research that revealed that more than 75% of the top 100 Indian Android apps contained critical security risks, which puts...
Jun 28, 2022
The pandemic has turned into a catalyst for transformation in enterprises across sectors. Indian organizations are continuously learning to adapt to the new realities of working. However, they still...
Jun 09, 2022
The global cyber security market size is anticipated to reach USD 366.10 billion by 2028 and exhibit a CAGR of 12.0% during the forecast period. The surging number of e-commerce platforms and the...
Jan 06, 2022
As the reliance on technology has grown, no business can achieve organizational objectives without a full arsenal of enterprise platforms and applications. Having the right tools enables your teams...
Jan 04, 2022
Data security, confidentiality, integrity, and availability are now key issues for all organizations, as is the imperative to use data ethically while complying with a complex web of industry and...
Jan 03, 2022
At least 30% of critical infrastructure organizations will experience a security breach by 2025, which will most likely result in the halting of an operations- or mission-critical cyber-physical...
Dec 09, 2021
Akamai Technologies has announced the launch of App & API Protector, the company’s next-generation web application and API protection (WAAP) solution. It provides a holistic set of robust...
Nov 11, 2021
There is a significant breakdown in collaboration between two of the central components of the IT team: networking and security, according to Netskope’s research. While 49% of security teams and 44%...
May 10, 2021
Not long back in my professional career, I have seen a time when the most common complaint of enterprise IT heads was the lack of realization from their top management about the value technology...
May 03, 2021
The black swan event of 2020 and its rampage across the globe compelled organizations to take wide-ranging measures to keep their operations afloat, which essentially begun with enabling remote...
May 03, 2021
While most organizations today are using cloud-native apps, Kubernetes and microservices, they struggle to secure and connect the complex environments resulting from them, according to Volterra-...
Dec 22, 2020
Developer productivity and collaboration in open source improves in 2020, according to GitHub’s State of the Octoverse report. The report provides a detailed look at the developer and open source...
Dec 03, 2020
The financial services sector is experiencing significant commercial disruption coupled with rapid innovation as established institutions strive to become more agile and meet evolving customer demand...
Sep 23, 2020
The National Health Authority has come out with a draft National Health Data Management Policy which proposes to create a 'digital health id' for all citizens so an individual's personal health...
Sep 08, 2020
Bring your own PC (BYOPC) security will reach mainstream adoption in the next two to five years, while it will take five to 10 years for mainstream adoption of secure access service edge (SASE) to...
Aug 27, 2020
More than 90% of business leaders say cloud is a priority in the COVID-19 shutdown. They are relying more on cloud technologies but are seeing more cybersecurity attacks. Half a year into the...
Aug 21, 2020
Software-defined wide-area networking (SD-WAN) is rapidly replacing the traditional WAN for remote office and branch deployments. SD-WAN was designed to provide a wide range of benefits to support...
Aug 10, 2020
Maintaining business continuity with proper IT infrastructure and security tools a challenge for IT pros during COVID-19 crisis
The COVID-19 crisis led countries and organizations to shut down physical offices and move operations online. This was not easy as IT professionals and departments needed to maintain business...
Jul 29, 2020
Recently, I was talking to CIOs of quite a few non-services companies. I say non-services because many of them do not like to be identified as ‘manufacturing’ business—quite rightly so. They...
Jun 22, 2020
Finally, in India, as elsewhere in the world, governments are giving in to the demands of a ravaged economy and have opted for staggered opening. India’s Lockdown 5.0 that kicked off on June 1 is...
Jun 22, 2020
It took some time but by now, most of us have accepted the new reality, that is, living life with COVID-19. This year’s pandemic has put the entire world to a standstill and forced organizations to...
Jun 17, 2020
Most companies see strong business drivers to adopt IoT as part of a broader digital transformation process, according to Syniverse-Omdia study. Improved efficiency and productivity, improved product...
Jun 02, 2020
People aren’t protecting themselves from cyber security risks even though they know they should, according to LastPass by LogMeIn’s Psychology of Passwords report. Year after year there is heightened...
May 06, 2020
In the current ecosystem, heterogeneous technology landscapes are becoming more and more prevalent due to partial movement of individual applications to cloud to achieve quick success and due to buzz...
Mar 05, 2020
While adoption rates for public cloud continue to grow, security is still the number one roadblock, which is understandable considering the volume and variety of threats organizations face today,...
Feb 21, 2020
Zscaler, the leader in cloud security, today announced that Zscaler Private Access (ZPA) is the first zero trust architecture to achieve Amazon Web Service (AWS) Security Competency status. The ZPA...
Oct 29, 2019
Akamai, the intelligent edge platform for securing and delivering digital experiences, recently announced enhancements focused on maximizing security, quality, and reliability from the cloud to the...
Oct 16, 2019
Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, recently announced that IndiGo, India’s largest airline, has deployed Fortinet Secure SD-WAN solution across its...
Sep 30, 2019
Internet users in Asia-Pacific want security and privacy guarantees for the Internet of Things (IoT) -- the rapidly expanding network of devices, physical objects, services and applications that...
Sep 30, 2019
Cybersecurity issues are increasingly becoming a concern in merger and acquisition (M&A) deals, shows a new research report. The study conducted by Forescout suggests that IT and business...
Jul 08, 2019
Security leaders need to leverage the automation continuum to create new value for their organizations: Gartner
Leveraging the automation continuum is security and risk management leaders’ latest imperative in creating and preserving value at their organization, according to Gartner. Katell Thielemann,...
Jun 20, 2019
Recently, a new class of Intel CPU vulnerabilities was published by the microchip giant. Known as speculative execution side-channel vulnerabilities, they affect almost every Intel processor produced...
May 29, 2019
It is elections time and there has been huge uproar over the electronic voting machines (EVMs) as opposition accuses the government of manipulation. But that is politics. What cannot be taken lightly...
May 22, 2019
Unsecured Internet of Things or IoT devices in the workplace and those used by third parties are causing large scale cyber attacks, disrupting the privacy and security of organizations. But most...
May 09, 2019
The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides a network that enables banks to send and receive information about financial transactions in a secure, standardized...
May 08, 2019
Akamai, the intelligent edge platform for securing and delivering digital experiences, today announced enhancements designed to help businesses accelerate their cloud migration strategy. The new...
Mar 11, 2019
Feb 19, 2019
A majority of consumers are willing to walk away from businesses entirely if they suffer a data breach, with retailers most at risk, according to Gemalto. Two-thirds (66%) are unlikely to shop or do...
Dec 13, 2018
Symantec launches industry’s first neural network to protect critical infrastructure from cyber warfare
Symantec today introduced Industrial Control System Protection (ICSP) Neural, the industry’s first neural network-integrated USB scanning station that helps organizations protect critical...
Dec 07, 2018
Enabling the business outcome in a ‘Real-Time’ enterprise environment is the next challenge for global brands and government agenciesin 2019. Tech companies will need to drive hard to continually...
Nov 30, 2018
Gemalto, the global leader in digital security, is expanding highly efficient IoT connectivity with the launch of its Cinterion Narrowband IoT (NB-IoT) wireless module platform. The new solution...
Nov 26, 2018
A new global research report by Barracuda Networks, “Security, Connectivity, and Control: The Challenges and Opportunities of SD-WAN” surveyed IT leaders and networking and security professionals to...
Oct 29, 2018
APAC is ahead of the US and EMEA in terms of automation for processes involved in the management of firewall rules and security policy, according to the results of a global survey conducted by...
Oct 29, 2018
Asia/Pacific excluding Japan (APeJ) spending on security related hardware, software and services will reach USD 28.76 billion in 2022 with a compound annual growth rate (CAGR) of 20.7% over the...
Oct 26, 2018