Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.
Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.
The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.
Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.
From CIoTO to automation architect, new IT roles are rising to fill emerging needs. Some may fizzle, but others may have a long future thanks to underlying IT trends.
Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.
Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.
Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.
At Volkswagen India, Milind Nanal performed implementation of redundant appliances threat prevention subscription in order to replace the installed perimeter firewall. A separate firewall was established for internal segmentation and production network. This led to cost benefits and freed up significant bandwidth for the organization.