Firewalls

What is a cyber kill chain?

The American military was the first to formalise the concept of a 'kill chain', loosely defined as the six steps in a chain to go through to eliminate a target. These steps fall under the acronym F2T2EA: Find, Fix, Track, Target, Engage, Assess.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

The top 5 cyber security jobs with growing demand in India

The need for experienced professionals is so high that companies are willing to pay a premium salary of over Rs 1.5 to 4 crore to top talent. This has increased the cyber security budget by 71% as per PwC.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Pragnesh Mistry

For RPG Group, Pragnesh Mistry setup an ISO 27001 framework based on which the availability of business-critical data to authorized users, communication link availability, and necessary controls were built through single service provider. 
 

Sanjay Gurav

At Batlivala and Karani Securities, Sanjay Gurav implemented synchronized security to have the best defenses to coordinated attacks which keep changing rapidly.

Sandeep Jamdagni

At Ashiana Housing, Sandeep Jamdagni, built a complete security system and policy to ensure users are aware of threats and the systems and networks are secure.

Mohd Imran

L&T Financial Services revamped the security architecture with multiple layer defense with proactive security monitoring that includes perimeter security, intrusion prevention system, web application security and endpoint security to ensure applications, computers, data, and network is defended from emerging cyber-threats, attack, unauthorized access or damage.

Mahesh Chandra Srivastava

At IFFCO TOKIO General Insurance Company, Mahesh Chandra Srivastava designed a solution based on next-gen firewalls with existing firewalls in the outer perimeter of DC so that they can have two-tier security. They have converged all three firewalls into single NGFW with redundancy, catering to three internet gateways from three ISPs for DC.

Sanjeev Lamba

Sanjeev Lamba led the consolidation of IT teams for better control over IT infra and end user services at UNOMinda Group.

Fortinet introduces ML capabilities to its FortiWeb web application firewall

The new innovations to FortiWeb provide a dramatic increase in detecting web application threats with nearly 100 percent accuracy.