Advertisement

Harnessing GenAI’s Potential in Cybersecurity – Managing Risks, Maximizing Benefits

By Ripu Bajwa, Director and General Manager, Data Protection Solutions, Dell Technologies India Generative AI (GenAI) represents a significant turning point for cybersecurity both as...

Role of BI and data analytics in revolutionising personal finance management   

By Anurag Sanghai, Principal Solution Architect, Intellicus Technologies The new generation of ‘digital native' consumers is relying on much more than traditional banking products to...

Can You Have Bulletproof Security Without Network Lag? Unveiling the Secret

By Vaibhav Dutta, Associate Vice President and Global Head-Cybersecurity Products & Services at Tata Communications Securing a modern enterprise network can feel like a high-wire...

Healing cyber wounds in global healthcare

By Morgan Wright, Chief Security Advisor, SentinelOne The recent ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group, has highlighted critical vulnerabilities within the...

Importance of security-by-design for IT and OT systems in building a security resilient framework

By Pritam Shah, Global Practice Head - OT Security and Data Security Traditionally, Information Technology (IT) systems—including computer storage and networking devices—and Operational Technology (OT)...

Harnessing the power of DevOps for seamless software delivery

By Anand JK Jain, Vice President - Solutions Engineering, MSys Technologies DevOps can transform software development by enabling collaboration, automation, and integration across teams and...

Shift left security – Security by design in DevOps

By Brijesh Balakrishnan, Vice President & Global Head of Cybersecurity Practice, Infosys As part of accelerated digital transformation and the recent evolution of technologies, enterprises...

Dell and Red Hat transform AI complexity into opportunity

By Caitlin Gordon - Vice President, Product Management, Dell Technologies In the rapidly evolving landscape of artificial intelligence (AI), seizing opportunities amidst complexity is paramount....

Evolving Cybersecurity Practices Through AI’s Large Language Models

By Gregor Stewart, Vice President of Artificial Intelligence at SentinelOne The tech world has been abuzz surrounding AI for well over a year. Yet, beyond...

The XZ-Utils backdoor is a reminder of why we need supply chain security

Attributed by Nathan Wenzler, chief cybersecurity strategist, Tenable The XZ-Utils backdoor is one of the most well-executed supply chain attacks sharing a podium spot with...
- Advertisement -

Follow Us

6,226FansLike
243FollowersFollow
488FollowersFollow
101SubscribersSubscribe

Latest article

Western Digital Introduces World’s Highest Capacity 2.5” Portable HDDs in India; Boosts Its Most...

With the explosion of digital content, people need bigger and more robust solutions to help access and preserve it all. Western Digital introduces a...

Secureye Launches Revolutionary PHOENIX IP Camera Series at Grand Event in New Delhi

Secureye, the leading security and surveillance brand, proudly announced the launch of its advanced PHOENIX IP camera series at a grand event held at...

Mphasis Unveils Mphasis NeoCruxTM and Mphasis NeoZetaTM: A Powerful Duo for AI-Driven Software Engineering...

Mphasis, an Information Technology (IT) solutions provider specialising in cloud and cognitive services, announced the launch of Mphasis NeoCruxTM, an industry-first tool designed to...
- Advertisement -