Pereira has nearly three decades of journalism experience. He is the former editor of CHIP, InformationWeek and CISO MAG. He has also written for The Times of India and The Indian Express.
The business world is going through a phase of hyper transformation and hyper digitalization. So, the building blocks of a cybersecurity strategy are quite different from what they were a few years ago. CISOs now need to prioritize threats in the context of their businesses.
The increasing volume, frequency and sophistication of cyberattacks has made cyber resiliency a top priority for security leaders. But there are certain roadblocks to overcome before an organization can be cyber resilient, advise Samir Mishra and Navin Mehra of Cisco.
Prior to the COVID-19 pandemic, the roles and responsibilities of CISOs were centered around protecting IT infrastructure. Today, however, the role has changed and is closely aligned with the business and its associated risks. A CISO is also the custodian of digital trust and privacy.
Technology implementations should be paired with a thought process of prioritizing automation, innovation and continuous improvement. Eliminating passwords and implementing AI/ML at the front end can reduce risks from human carelessness, says Nikhil Chawla of Colgate Global Business Services.
Global infrastructure services company Encora needed to secure the crown jewel systems and endpoints of its 7,300-strong workforce. The firm had to assure its Fortune 500 clients that their data was safe. Here's how a privileged access management solution and zero trust framework helped.
Four major cloud providers - AWS, Google, Microsoft and Oracle – will participate in a $9 billion U.S. Department of Defense remote computing contract, marking a departure from an earlier winner-take-all approach that ended up in court and slowed the DoD's cloud transformation program for years.
Cyber resilience extends beyond cyberattacks and encompasses the convergence of security and disaster recovery and takes into account other factors such as supply chain disruption, attacks on critical infrastructure, epidemics, market fluctuations, power outages, and natural disasters.
Much groundwork needs to be laid to launch 5G services. The government and telecom groups must work with an ecosystem of partners from academia, research and development, standards bodies and telecom equipment and handset manufacturers, and all must tackle network and equipment security issues.
How can a platform-led security approach improve employee and customer experiences? Mindtree CISO Chandan Pani describes how an integrated security approach helped him transform his organization from the pre-COVID-19 era to a hybrid, no-perimeter era that focuses on both security and productivity.
Multi-cloud environments pose major challenges to security practitioners who need full visibility of infrastructure and applications. Organizations should unify identity and security controls to monitor the entire threat landscape, says Terence Gomes, country head of Microsoft security in India.
Ben Goodman, Okta's Asia-Pacific senior vice president and general manager, explains why critical infrastructure companies lag behind born-in-the-cloud companies in zero trust adoption. He expects traditional industries to adopt zero trust for some application services and then expand into others.
An online search by cybersecurity firm Cyfirma found more than 80,000 unpatched cameras made by Hangzhou Hikvision Digital Technology Co. Attackers could exploit the vulnerability to add the cameras to a botnet or as a launching point for lateral movement deeper into the camera operator's network.
Response to supply chain attacks has evolved thanks to increased awareness and education, but more work needs to be done to understand how challenges can be addressed more systematically, says Sean Duca, vice president and regional chief security officer, Asia-Pacific and Japan, Palo Alto Networks.
An unnamed Eastern Europe company became a victim of that continent's largest-ever distributed denial-of-service attack, says Akamai. The report comes in a season with a record-breaking volume of DDoS attacks, fueled greatly by geopolitical events led by Russia's invasion of Ukraine.
The era of pandemic-induced telework is also the era of higher reliance on mobile devices for sensitive workplace information - meaning we're likewise living in the age of fretful chief information security officers, a new survey concludes. "Companies are still struggling" to secure mobile devices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.