Advanced Persistent Threats

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Software is the key enablement for defining security perimeter: Makarand Joshi, Citrix

Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.

Aditya Birla Group suffers cryptojack attack; 2000 computers used for mining Monero

First detected at an overseas subsidiary of the group a month ago, the malware spread to manufacturing and other services companies of Aditya Birla group. Monero was the currency mined.

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.

The clearer the CSO role, the easier to get budget approved: Mushtaq Ahmed, CSS Corp

For an organization to be secure from any cyber threats, investments should be made in technology, people, and policy, says Mushtaq Ahmed of CSS Corp.

ManageEngine fixes critical zero-day vulnerabilities that could affect close to 10,000 companies in India

Here’s all you need to know about ManageEngine’s zero-day vulnerabilities, and what the company has done to remediate the problem

Insecure by design: What you need to know about defending critical infrastructure

Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.

Smart and AMRUT cities: IoT and security take center stage

As digitally connected infrastructure becomes ubiquitous, IT implementations have to ensure better data security.

Security budgets of Indian organizations: Where is it heading?

The perpetual catch up game between hackers and CISOs is resulting in a steadily rising cybersecurity budget. We take a look at what’s driving this trend and assess the security roadmap in 2018.

Emerging technologies to combat new age threats

Given the new age threat landscape, CIOs and CSOs across the board can no longer bank upon a fortified periphery that would protect the organization’s crown jewels.

Risk adaptive security isn’t a fancy jargon: Praveen Asthana, Forcepoint

Our unique approach to monitor the rhythm of people and flow of data across organisations has been effective, says Praveen Asthana, CMO at Forcepoint.

Sridhar Namachivayan appointed enterprise head at Trend Micro

The former Skybox Security executive will head a team of large enterprise accounts for Trend Micro India.