Physical security

7 hot new IT jobs — and why they just might stick

From CIoTO to automation architect, new IT roles are rising to fill emerging needs. Some may fizzle, but others may have a long future thanks to underlying IT trends.

10 questions to ask when considering a cloud services provider's encryption solutions

Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.

Chinmay Shrikant Pradhan

At NSE IT, Chinmay Shrikant Pradhan led implementation of advanced cybersecurity offerings, covering a range of technologies to validate data across applications and processes, along with media management. 

Debojit Maitra

Debojit Maitra introduced all level protection Aditya Birla Fashion and Retail. He has implemented various security measures such as datacenter protection, servers and application protection, implemented Machine Learning and Deep Learning in perimeter and gateway level network, adequate measures in web & email security, BYOD device and end point protection and detection that would protect their digital systems from malicious Intruders of all sorts.
 

Deepak Kalambkar

Deepak Kalambkar trained around 250 operators on data security, and implemented backup and data security tools and technologies at Marvel Data Services.

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.

What is a Chief Security Officer? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

Trend Micro detects and blocks 3.4mn high-risk email threats in 2017

Cloud App Security managed to detect over 50,000 ransomware and 3,000 BEC threats in the last three quarters of 2017.

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems?

Serious vulnerabilities discovered in IoT-based surveillance cameras

Smart security cameras manufactured by global brand Hanwha Techwin have been discovered to be vulnerable to remote attacks, exposing even the other devices on the network to security threats.

 

Indian businesses report higher vulnerability to fraud, says Kroll report

Kroll, a corporate investigations and risk consulting firm based in the US, has published its 10th annual Global Fraud & Risk Report. The survey conducted among business executives across the globe has reported higher rate of fraud incidents in India when compared to the global average. 
 

Reaper emerges a cyber security threat for global enterprises

APT37, popularly known as Reaper has been primarily targeting the chemicals, electronics, manufacturing, aerospace, automotive, and healthcare industries for North Korean state interests.