Ramakrishnan SeshagiriComments Off on Choosing your Monitoring Solution (SIEM vs SIEMaaS vs SOCaaS)
Why monitor? According to a Q4 2021 Internet security report from WatchGuard, almost 66% of all threats were zero-day vulnerabilities. Another statistic from Mandiant Threat Intelligence report states about 40%… Read more »
Suneet PahwaComments Off on Rise of 5G technology in India
The 5G adoption is expected to globally redefine a range of industries beyond mobile devices such as retail, manufacturing, transport, healthcare, and logistics.
Lt Gen R S PanwarComments Off on Strategic Thinking for Security: Defending the National Cyberspace – Part III
Introduction In the previous two parts of this blog, several strategic issues related to defense of our national cyberspace in the broad areas of governance, operational aspects and development of… Read more »
Going by the recent media reports, it would seem that the malicious hacker groups behind data breaches are in a competition of sorts. The latest Equifax data breach, which exposed… Read more »
Aditya AnandComments Off on 31 Cybersecurity Tips for Businesses
The Internet has gone from strength to strength and part of the beauty of it is the fact that it enables us all to communicate freely with people everywhere in… Read more »
This post is in regard to a session hosted at AISS 2016 – ‘Post-humans: Blurring of the Boundaries between Humanity and Technology’ wherein the speakers deliberated upon the issues of ethics and morality of technologically enhanced “post-humans”. The speakers of this session were Mr. Vinayak Godse, DSCI; Ms. Aastha Dhamija, DSCI; and Mr. Balaji Suryanarayana, Director & COO, CustomerXPs.