cyber security
-
How Do You Solve a Problem Like Cyber Security?
By Manoj Rai On 7 Dec 2015Happiest Minds UK discusses the new-age deception technologies UK businesses should adopt to bolster their cyber-security defences The recent TalkTalk cyber-security breach has brought the issue of security firmly back into the public’s psyche and has put both government and...
-
Disruptive Technology Weekly Roundup – Oct 22nd to Oct 28th
By Kiran Veigas On 28 Oct 2015Cloud computing is the foremost among the disruptive technologies that rule the IT industry. Organizations are leveraging public cloud for reducing the infrastructure costs and also for a faster delivery of technology projects. Since the data moved into the cloud...
-
The High Cost of False Positives to an Organization
By Vijay Bharti On 17 Aug 2015Cyber security teams are under tremendous pressure to safeguard their IT infrastructure and business data against the escalating threat of breaches. Even as organizations increasingly look to automated security tools to deal with threats, the downside to these cannot be...
-
Holistic Approach to Security & Compliance in the Cloud
By Raju Chellaton On 7 May 2015Ever since the popular information breach of Target in 2013, the imperative need for enterprises the world over to enable a holistic information security architecture has become top priority. That being said, even today, security and information today, for many...
Access Governance Cloud Governance & Risk Compliance Identity & Access Governance Security
-
Cyber Threat Intelligence – What is needed?
By Haren Bhatt On 6 Apr 2015Cyber Threat Intelligence (CTI) is a term used to address any kind of information that protects your organization's IT assets from potential security impeachment. CTI can take many forms. It could be internet based IP addresses or geo locations TTP's...
Tag Cloud
Subscribe for blog updates