The bears, pandas, kittens and chollimas are out in the open, and the military top-brass is apprehensive. Michael Sentonas, VP of Technology Strategy at CrowdStrike, gives us a dekko at the cyber espionage threat landscape.
From explainable AI to blockchain to building a super-fast processor, Subram Natarajan, CTO of IBM India/South Asia tells us how IBM does what it does best – innovate to stay ahead.
From evolving threats to DNS attacks and IoT security, John Maynard, Global Security Officer at Cisco brings to light present-day security challenges the enterprise needs to brace up to.
We have good success story with EDR through Bit Defender’s Ultra and elite versions implemented well by our channel partners, says Zakir Rangwala at BD Software Distribution.
Fresh from investments through Blackstone Ventures, data protection company TITUS is on the growth mode globally, and particularly in India, says Jim Barkdoll, CEO of TITUS.
Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.
By securing privileged access and secrets like API keys, SSL keys and encryption keys, organizations can their make journey to the cloud with a reduced risk posture, says Jeffrey Kok – Vice President, Pre-sales, Asia Pacific & Japan, CyberArk, in an interaction with IDG Media.
The shiny network appliances in organizations’ security infra are irrelevant as cloud is now a professionally managed utility, says Jay Chaudhry, founder & CEO at Zscaler.
From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.