Digital Transformation Blogs - Bigdata, IoT, M2M, Mobility, Cloud

IT security

Identity and Access Management

Privileged Identity Management – Why We Need It?

In an organization’s IT environment, there are several user accounts.  Out of these, the “Super User accounts” are usually among the most important ones as they are used for System administration.  These accounts are also called root accounts, administrator, admin or supervisor accounts, service accounts, application accounts, emergency accounts and so on depending on the […]
Read Now

Creating and Maintaining a Security Operations Center (SOC)

In recent times organizations have realized that IT security cannot be treated as a surrogate function and it has started to get the respect it deserves. IT security as a whole and IT Security Operation centers, in particular, are getting much more attention and investments than they received historically. An IT Security Operations center (SOC) […]
Read Now

Greatest GRC Challenges

We are in the threshold of interesting times where technology is radically changing the landscape individuals and organizations operate in. We live in times when a simple IoT device like a smartwatch can help gain access to confidential information. There is an increase in geopolitical undercurrents, business cycles are faster, regulations and compliance enforcements are […]
Read Now

Defending Advanced Persistent Threats – Be Better Prepared to Face the Worst

We often hear news about emerging cyber security threats and attacks impacting every industry. With advanced malwares, zero day exploits and persistent threats, cyber-attacks are now becoming very sophisticated in nature. Targeted attacks are seen from highly motivated attackers, well organized and resourced groups and even from state sponsored actors. Among these, the biggest security […]
Read Now

The Rise of Cloud-based Managed Security Services

Cyber security is a massive issue in today’s digital world and yet, many organizations are struggling to address an increasingly complex threat landscape. The biggest quandary lies with the ever ubiquitous smartphone and tablets that contain sensitive data and are rarely protected well. Even as enterprises grapple with the challenge of mobile workers and an […]
Read Now
Identity and access management

Disruptive Technologies Pose Challenge to Network Security

Security has always remained a major concern for organisations across verticals. Organizations worldwide have ranked IT security as one of their priorities as increasingly sophisticated attacks, new data protection regulations, and most recently insider fraud and data breaches, threaten to disrupt and irreparably damage their businesses.Small or large, no matter of the size of the […]
Read Now

How Do You Solve a Problem Like Cyber Security?

Happiest Minds UK discusses the new-age deception technologies UK businesses should adopt to bolster their cyber-security defences The recent TalkTalk cyber-security breach has brought the issue of security firmly back into the public’s psyche and has put both government and organisations on high alert. It seems that regardless of your vertical market, be it finance, […]
Read Now

5 Ways to Secure the Public Cloud

As cloud computing becomes more sophisticated and mainstream, the shift to the public cloud is gaining tremendous traction. With big-brand clouds (Amazon Web Services, Google Cloud Platform and Microsoft Azure) fast evolving, more and more enterprises are moving away from private clouds. However security is justifiably a top concern when moving applications and data into […]
Read Now

Disruptive Technology Weekly Roundup – Oct 22nd to Oct 28th

Cloud computing is the foremost among the disruptive technologies that rule the IT industry. Organizations are leveraging public cloud for reducing the infrastructure costs and also for a faster delivery of technology projects. Since the data moved into the cloud is often dependent on the application that creates and maintains it, it is vital to […]
Read Now

Archives

Categories