Authored by Mohan Raj, Regional Director, GCC Region, India & Levant at LogRhythm Every year, more organizations in India are hit by catastrophic ransomware attacks. Ransomware has the capability to cause…
Deep Dive
-
-
Understanding Threat Actors with Breach and Attack Simulation Establishes Continuous Security Validation
by CIO AXISBy- Shailendra Shyam Sahasrabudhe, Country Manager, India, UAE and South East Asia, Cymulate Ltd “To know your enemy, you must become your enemy” – The Art of War, Sun Tzu.…
-
-
-
By Satish Kumar V, CEO, EverestIMS Technologies We live in a data-driven world, and organizations must continuously seek innovative ways to gather, analyze, and gain insights from large datasets. With the…
-
Fine-tuning cybersecurity strategy and enhancing best practices – key to organizational success
by CIO AXISBy Rajarshi Bhattacharyya, Co-Founder, Chairman and Managing Director, ProcessIT Global Every individual in an organizational setup should take responsibility to protect the business from cyberattacks. An organization’s reputation, legal liability,…
-
By Himanshu Gautam, Technical Director – West & South India, Radware The BFSI (Banking, Financial Services, and Insurance) sector has seen rapid adoption of digital transformation tools, which has made the sector…
-
By Rajesh Thadhani, Vice President – Digital Transformation & Services, Crayon Software Experts India The definition of IT Infrastructure or IT Estate has remained the same throughout the years, even…
