Malhotra has more than two decades of experience in technology journalism and public relations. She writes about enterprise technology and security-related issues and has worked at Biztech2.com, Dataquest and The Indian Express.
Generative AI has advanced rapidly over the past year, and organizations are recognizing its potential across business functions. But businesses have now taken a cautious stance regarding gen AI adoption due to steep implementation costs and concerns regarding hallucinations.
Bloomberg, JPMC, European Central Bank, Morgan Stanley, Nasdaq, HDFC ERGO and Commonwealth Bank Australia are harnessing generative AI to enhance productivity and customer experience. Generative AI has the potential to reshape job roles, redefine customer interactions and create new business models.
In the rapidly evolving technological landscape, cloud-native solutions and microservices are revolutionizing the traditional software supply chain. Kavita Viswanath of JFrog underscores the need for an integrated platform to tackle these complexities in a globally distributed development environment.
In the past year alone, investigators have received a staggering 30 million reports of online child sexual exploitation globally. It's time to harness emerging technologies such as AI and create new legal frameworks to fight against these criminal acts, said Guillermo Galarza of the ICMEC.
Enterprises are grappling with constantly changing technologies and new stakeholders, making it hard for security teams to achieve both cyber maturity and long-term sustainability. Standardization plays a critical role in cyber resilience, said Sunil Varkey, former CISO of Wipro and Idea Cellular.
Flipkart embraced a comprehensive security maturity program that incorporated defense-in-depth, automation, zero trust and secure SDLC/security-by-design principles across its four subsidiaries. Flipkart's Raakesh Thayyil discussed the importance of a cohesive strategy.
Flipkart Group companies achieved a uniform SOC implementation by adopting a single data ingestion point. This simplifies integration, log parsing and normalization challenges with two SaaS-based SIEM tools, minimizing device and data source modifications.
Securing distributed and hybrid workforces is challenging traditional cybersecurity paradigms. Integrating zero trust with secure access service edge, SASE, in a unified platform addresses the threats associated with the need for flexibility and a data-anywhere environment.
Developing a cyber resilience playbook is a continuous process that demands constant enhancement, rather than a one-time input. By beginning with targeted action items and progressively expanding upon them, organizations can make every conceivable recovery scenario more manageable.
Gaurav Gupta from MeiTY, India, recommends that CIOs and CISOs should initiate their digital forensics readiness journey in advance by training first responder employees to prevent any evidence contamination. Gupta emphasized that data created will always remain.
The successful implementation of a zero trust strategy requires a comprehensive vision that combines simplicity, visibility and practicality. By taking a phased approach and aligning it with a unified goal and vision, organizations can establish a robust foundation for zero trust adoption.
Gartner predicts that by 2026 organizations that prioritize security investments through continuous exposure management will be three times less exposed to the risk of a breach. This approach enables a shift from reactive to proactive cybersecurity, with exposure management forming its foundation.
Studies indicate that on average most enterprises use 25 to 49 security tools sourced from up to 10 different vendors. To make this environment easier to manage, CISOs should adopt an integrated approach driven by consolidation and automation, says Microsoft's Terence Gomes.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.