Harnessing GenAI’s Potential in Cybersecurity – Managing Risks, Maximizing Benefits
By Ripu Bajwa, Director and General Manager, Data Protection Solutions, Dell Technologies India
Generative AI (GenAI) represents a significant turning point for cybersecurity both as...
Role of BI and data analytics in revolutionising personal finance management
By Anurag Sanghai, Principal Solution Architect, Intellicus Technologies
The new generation of ‘digital native' consumers is relying on much more than traditional banking products to...
Can You Have Bulletproof Security Without Network Lag? Unveiling the Secret
By Vaibhav Dutta, Associate Vice President and Global Head-Cybersecurity Products & Services at Tata Communications
Securing a modern enterprise network can feel like a high-wire...
Healing cyber wounds in global healthcare
By Morgan Wright, Chief Security Advisor, SentinelOne
The recent ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group, has highlighted critical vulnerabilities within the...
Importance of security-by-design for IT and OT systems in building a security resilient framework
By Pritam Shah, Global Practice Head - OT Security and Data Security
Traditionally, Information Technology (IT) systems—including computer storage and networking devices—and Operational Technology (OT)...
Harnessing the power of DevOps for seamless software delivery
By Anand JK Jain, Vice President - Solutions Engineering, MSys Technologies
DevOps can transform software development by enabling collaboration, automation, and integration across teams and...
Shift left security – Security by design in DevOps
By Brijesh Balakrishnan, Vice President & Global Head of Cybersecurity Practice, Infosys
As part of accelerated digital transformation and the recent evolution of technologies, enterprises...
Dell and Red Hat transform AI complexity into opportunity
By Caitlin Gordon - Vice President, Product Management, Dell Technologies
In the rapidly evolving landscape of artificial intelligence (AI), seizing opportunities amidst complexity is paramount....
Evolving Cybersecurity Practices Through AI’s Large Language Models
By Gregor Stewart, Vice President of Artificial Intelligence at SentinelOne
The tech world has been abuzz surrounding AI for well over a year. Yet, beyond...
The XZ-Utils backdoor is a reminder of why we need supply chain security
Attributed by Nathan Wenzler, chief cybersecurity strategist, Tenable
The XZ-Utils backdoor is one of the most well-executed supply chain attacks sharing a podium spot with...