Intrusion

What is a cyber kill chain?

The American military was the first to formalise the concept of a 'kill chain', loosely defined as the six steps in a chain to go through to eliminate a target. These steps fall under the acronym F2T2EA: Find, Fix, Track, Target, Engage, Assess.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

Partner Content
Cryptojacking: FAQs for Businesses

More than 2,000 computers from Aditya Birla company were targeted by hackers for cryptojacking.

The top 5 cyber security jobs with growing demand in India

The need for experienced professionals is so high that companies are willing to pay a premium salary of over Rs 1.5 to 4 crore to top talent. This has increased the cyber security budget by 71% as per PwC.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Your digital location is protected by the Constitution: U.S. Supreme Court

In a landmark decision, the Supreme Court today affirmed that law enforcement must obtain a warrant to access mobile phone location data collected by wireless providers – a win for consumer privacy.

Satish K Sharma

Satish K Sharma led a team of experts to carry out a detailed gap analysis against ISO-27001:2013 guidelines to attain high security levels. 
 

Sanjay Gurav

At Batlivala and Karani Securities, Sanjay Gurav implemented synchronized security to have the best defenses to coordinated attacks which keep changing rapidly.

Debojit Maitra

Debojit Maitra introduced all level protection Aditya Birla Fashion and Retail. He has implemented various security measures such as datacenter protection, servers and application protection, implemented Machine Learning and Deep Learning in perimeter and gateway level network, adequate measures in web & email security, BYOD device and end point protection and detection that would protect their digital systems from malicious Intruders of all sorts.
 

Mohd Imran

L&T Financial Services revamped the security architecture with multiple layer defense with proactive security monitoring that includes perimeter security, intrusion prevention system, web application security and endpoint security to ensure applications, computers, data, and network is defended from emerging cyber-threats, attack, unauthorized access or damage.

Dharmendra Kumar

Tata Power Delhi Distribution faced the need to simplify security operations and monitor grids and critical offices on a 24x7 basis. Dharmendra Kumar was instrumental in rolling out a central management system and command & control center, an access control system and a perimeter intrusion detection system.