Mayank LauComments Off on SOCs transitioning to Cyber Defense Centers
Trust is a market differentiator for the 21st century clients. To achieve trust, service providers need to protect client’s sensitive information which are either corporate secrets or personal information. Add… Read more »
Uday MittalComments Off on Product Security & DevSecOps – Security-by-design
Layers & extent of product security function and integrating security in rapid deployment cycle Ever since the field of software development has existed, the security of the product being developed… Read more »
Mayank LauComments Off on Cognitive Security: Myths & Reality of AI for Cyber Security
Cognitive Computing has just started permeating into our lives and is taking small steps to transform business models in the industry. Its use cases are not limited to speech, image… Read more »
…Realities, possibilities, experimentations, use cases and underlying capabilities. How it’s influencing solving security problems. The aim of cognitive computing is to mimic human thought process in a computerized model. Using… Read more »
This post is in regard to a session hosted at AISS 2016 – ‘Post-humans: Blurring of the Boundaries between Humanity and Technology’ wherein the speakers deliberated upon the issues of ethics and morality of technologically enhanced “post-humans”. The speakers of this session were Mr. Vinayak Godse, DSCI; Ms. Aastha Dhamija, DSCI; and Mr. Balaji Suryanarayana, Director & COO, CustomerXPs.
Amit GhoshComments Off on AISS 2016 inaugurated by Dr. Gulshan Rai
Dr. Gulshan Rai has been attending the DSCI Summit since the past 5 – 6 years, and he said that this year it being staged in Gurgaon was in itself… Read more »