Authentication

Sandeep Jamdagni

At Ashiana Housing, Sandeep Jamdagni, built a complete security system and policy to ensure users are aware of threats and the systems and networks are secure.

Yogesh Kumar

Lalitpur Power Generation Company implemented DMA integrated with active directory, Resource Manager to manage all video resources, and video firewall to ensure video traffic in secure and encrypted manner. 

Swapnil Shirwadkar

At IndiaFirst Life Insurance, Swapnil Shirwadkar led the implementation of Advanced Persistent Threat (APT) solution on all endpoints and servers, VPN with two-factor authentication, and data classification solution on all of their endpoints. 

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Fingerprints, Ensurity collaborate to bring innovative solution for Indian cybersecurity market

The companies are working closely to integrate their respective technological strengths to bring the first-of-their-kind smart USB devices to the global markets.

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

Are regulations keeping you from using good passwords?

Most companies are using password "best practices" that are out of date and ineffective. Regulations are getting in the way of changing them.

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.

IT leaders ready to embrace GDPR regulation; compliance challenges remain

IT leaders across the globe gear up to achieve compliance with General Data Protection Regulation (GDPR) which is just about to go live. 

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

Why securing containers and microservices is a challenge

Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.

What to do after a data breach: 5 steps to minimize risk

Website database breaches happen, and while there's little you can do to prevent them you can minimize your exposure. Here's what to do.