Author: Abbas Kudrati, Chief Cybersecurity Advisor, Microsoft Asia COVID-19 has forced businesses to adopt the changes in the working environment, which in turn have posed... Read More
Author: Abhishek Anand, Market Strategy Advisor, Castellum Labs With the development of advanced technologies and automation, cybersecurity controls have become omnipresent. Cybersecurity has become an... Read More
Author: Rishi Rajpal (Vice President – Global Security, Concentrix Corporation) The cybersecurity landscape is frequently changing due to the rapid development of the latest technologies,... Read More
Author: Hosam Badreldin (Director, Cloud Infrastructure Strategy, Thales) Cloud computing is gaining popularity with the increase in adoption by various industries and tech firms, but... Read More
Author: Kunal Sehgal (Former Managing Director for Global Resilience Federation) Credential stuffing implies the use of stolen credentials and information to gain unauthorized access to... Read More
Author: Rajiv Sharma (Vice President, EXL Service) Unforeseen and unexpected disaster events are a persistent issue in any organization. In the era of Digital Transformation,... Read More
Author: Dr. Lopa Mudraa Basuu (Executive Director Cyber Risk & Information Security Sysinnova Infotech) The ability to share information between people across the globe is... Read More
Author: Ramiro Rodrigues (Director of Security and Risk Management (CISO) of Gartner) Over the last two decades, the role of a CISO has gained significant... Read More
Author: Kishore Chavali (Assistant Vice President, Barclays Investment Bank) As most of the cybercrimes are committed for the sake of financial gains, it is only... Read More
Author: Rahil Karedia (Team Lead – Threat Intelligence, Network Intelligence (I) Pvt, Ltd.) Penetration testing is more of an art than a science. It is... Read More
Author: Ankit Satsangi (Virtual CISO & Security Advisor) Cyber Threat Intelligence (CTI) has become a trending topic. It is being considered by many organizations to... Read More
Author: Tom de Haan (Chief Information Security Ocer (CISO), Drechtsteden) A CISO is the security leader of the organization. The role of the CISO is... Read More