Advertisement

Harnessing GenAI’s Potential in Cybersecurity – Managing Risks, Maximizing Benefits

By Ripu Bajwa, Director and General Manager, Data Protection Solutions, Dell Technologies India Generative AI (GenAI) represents a significant turning point for cybersecurity both as...

Role of BI and data analytics in revolutionising personal finance management   

By Anurag Sanghai, Principal Solution Architect, Intellicus Technologies The new generation of ‘digital native' consumers is relying on much more than traditional banking products to...

Can You Have Bulletproof Security Without Network Lag? Unveiling the Secret

By Vaibhav Dutta, Associate Vice President and Global Head-Cybersecurity Products & Services at Tata Communications Securing a modern enterprise network can feel like a high-wire...

Healing cyber wounds in global healthcare

By Morgan Wright, Chief Security Advisor, SentinelOne The recent ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group, has highlighted critical vulnerabilities within the...

Importance of security-by-design for IT and OT systems in building a security resilient framework

By Pritam Shah, Global Practice Head - OT Security and Data Security Traditionally, Information Technology (IT) systems—including computer storage and networking devices—and Operational Technology (OT)...

Harnessing the power of DevOps for seamless software delivery

By Anand JK Jain, Vice President - Solutions Engineering, MSys Technologies DevOps can transform software development by enabling collaboration, automation, and integration across teams and...

Shift left security – Security by design in DevOps

By Brijesh Balakrishnan, Vice President & Global Head of Cybersecurity Practice, Infosys As part of accelerated digital transformation and the recent evolution of technologies, enterprises...

Dell and Red Hat transform AI complexity into opportunity

By Caitlin Gordon - Vice President, Product Management, Dell Technologies In the rapidly evolving landscape of artificial intelligence (AI), seizing opportunities amidst complexity is paramount....

Evolving Cybersecurity Practices Through AI’s Large Language Models

By Gregor Stewart, Vice President of Artificial Intelligence at SentinelOne The tech world has been abuzz surrounding AI for well over a year. Yet, beyond...

The XZ-Utils backdoor is a reminder of why we need supply chain security

Attributed by Nathan Wenzler, chief cybersecurity strategist, Tenable The XZ-Utils backdoor is one of the most well-executed supply chain attacks sharing a podium spot with...
- Advertisement -

Follow Us

6,227FansLike
242FollowersFollow
488FollowersFollow
101SubscribersSubscribe

Latest article

कृत्रिम (Krutrim) announces made for India, priced for India product strategy and roadmap for...

With a commitment to strengthen India’s tech sovereignty, कृत्रिम has announced new pricing and strategic future roadmap for Ola Maps, including powerful new Application...

Netskope announces integration with OpenAI’s ChatGPT Enterprise to strengthen data governance and compliance 

Netskope announced an integration with OpenAI’s ChatGPT Enterprise Compliance API to deliver API-enabled controls that bolster security and compliance for enterprise organisations using generative...

India records second highest weekly attacks per organisation in APAC at 3201, second only...

Check Point Research (CPR) releases new data on Q2 2024 cyber attack trends. The data is segmented by global volume, industry and geography. These...
- Advertisement -