Online security

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

Partner Content
Fabtech India ensures endpoint protection and secure network access with Seqrite EPS

"We have considered Seqrite EPS after a deep scrutiny. It offers a range of attractive features including secured IT policies with easy usability and manageability. Seqrite EPS clearly met our expectations in numerous categories."

Partner Content
Threats posed by portable storage devices

Organizations where portable devices are used or allowed often ignore the threats posed by such devices. This white paper will examine the nature of threats that organizations may have to face due to portable devices and as a counterpart to these threats how organizations can eliminate them.

Partner Content
How to identify, prevent and recover from cryptojacking attacks

Cryptojacking is a sneaky but extremely effective way for hackers to get their desired results in exactly the surreptitious, stealthy way they desire.

Privileged access is a critical pathway to all attacks: Jeffrey Kok, CyberArk

By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.

Sophisticated attacks go undetected with traditional security solutions: CrowdStrike

Speaking at IDG Security Day & CSO 100 Awards 2018, Ramanand Kambli and Satbir Singh from CrowdStrike highlighted how attacks are getting sophisticated, and how enterprises can address all security challenges with their cloud-based offering. 

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Regulation is key for blockchain adoption in Indian enterprise, say security leaders

India's BFSI cybersecurity leaders discuss the enterprise prospects of blockchain technology, at the IDG Security Day and CSO100 Awards in Faridabad.

Ramesh Menon

At Aegis Customer Support Services, Ramesh Menon’s team developed online security training portals for its users, and initiated advanced threat protection and end point security for clients.

Debojit Maitra

Debojit Maitra introduced all level protection Aditya Birla Fashion and Retail. He has implemented various security measures such as datacenter protection, servers and application protection, implemented Machine Learning and Deep Learning in perimeter and gateway level network, adequate measures in web & email security, BYOD device and end point protection and detection that would protect their digital systems from malicious Intruders of all sorts.
 

Partner Content
Anatomy of a Data Breach: How to adopt a proactive approach

With a phenomenal shift towards digitization, the vulnerability towards cyber breach is on the rise for almost all companies.

Partner Content
The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Most big surveys reckon that human errors are at the heart of security incidents.