Careers

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

Kaspersky Lab extends ‘Sales Army’ and ‘Support Army’ schemes

The programs reward both, the sales representative as well as the pre-sales representatives.

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

Kartik Shahani is APJ Channel Chief at RSA

Kartik Shahani is back to RSA (a Dell Technologies Business) as APJ Channel Chief after a short stint with IBM.

7 hot new IT jobs — and why they just might stick

From CIoTO to automation architect, new IT roles are rising to fill emerging needs. Some may fizzle, but others may have a long future thanks to underlying IT trends.

10 questions to ask when considering a cloud services provider's encryption solutions

Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

What is corporate espionage? Inside the murky world of private spying

Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.

Milind Nanal

At Volkswagen India, Milind Nanal performed implementation of redundant appliances threat prevention subscription in order to replace the installed perimeter firewall. A separate firewall was established for internal segmentation and production network. This led to cost benefits and freed up significant bandwidth for the organization.

Bhavesh Kumar

At Hero FinCorp, Bhavesh Kumar implemented tools for change and incident management. They are implementing DLP, IdAM and SIEM, and is also migrating from IPV4 to IPV6.