Search
Register

Search

25 search results for "cybersecurity"

Cyber Security Threats to Look For in 2020

Cyber Threats to Look For in 2020 With the advent of new technologies, the doors of complex cybersecurity challenges have opened. This advancement has provided cyber criminals with thousands of opportunities to exploit and damage an organisation’s cybersecurity infrastructure. The year 2019 had some worst data breaches. 2020 is going to be a challenging year for the businesses, organisations and g...

How data security affects digital marketing efforts?

– By Mr. Vikram Kumar, Managing Director, SRV Media Pvt. Ltd. Digital marketing is the flavor of the era. It opens up avenues of opportunities for advertising and socializing for any brand. Online presence is a must for a brand to be successful these days and hence they spend a lot of money on their digital marketing campaigns. In the current times, it is crucial to have a good digital marketing s...

New book on IoT and cyber security

To secure India’s future as a digital superpower, we need to think ahead and secure our data, infrastructure, IP and innovation by securing our digital footprint. In an environment where the cyber threats are growing each day exponentially, and the country is having to deal with cyberattacks arising from regional geopolitical tensions, and trade-related repercussions, the nation’s prog...

State of IoT Security Report for October 2019

Find out how the threat landscape facing IoT deployments in India changed in the Jul-Sep quarter of 2019

UL Assessment to Verify Security Claims of GE Appliances’ Connected Products Meeting Critical Cybersecurity Benchmarks

UL announced that GE Appliances is the world’s first household appliance brand to test its connected products against the UL IoT Security Rating assessment.  The IoT Security Rating is a security verification and labeling solution for consumer Internet of Things (IoT) products.  This solution aims to help manufacturers and developers demonstrate the security due diligence of their products by leve...

CloudOptics – Securing Digital Enterprises | Introduction

Checkout introduction to Cloud Security Platform CloudOptics https://www.linkedin.com/feed/update/urn:li:activity:6477868035540639744  

Cybersecurity in the age of V2X

NASSCOM Engineering R&D is inviting you to join a webinar on “Cybersecurity in the age of V2X” on 26th November, Tuesday at IST 15:00 – 16:00 hours. Today’s business environment is one which can be defined as very dynamic and dramatic in nature, most likely in the cases where technology is shaping vividly almost every day! In such a scenario, we hear a drastic increase in the number of embedde...

GDPR- And It’s Impact on Cyber security

General Data Protection Regulation (GDPR) is a replacement for the European Data Protection Legislation. On May 25th, 2018, after 20 years, GDPR denoted a first such major overhaul to the Data protection act of the European Union. It effectively replaces all the varying implementations of EU Data Protection directive across Europe, giving all organizations today as a standard set of regulations an...

Cloud Data Leak Prevention (DLP)

In today’s data world, data breaches are commonplace. Not a day goes by without a headline about a massive data breach. Just to put this into perspective, there have been more than 14 billion records lost since 2013. The leaks come from both insiders and outsiders – whether they are accidental leaks or malicious activities like phishing and malware.  All enterprises are in the cloud and so i...

Leader Talk: Interview with Ashish Saxena, Director of AKS IT Services

Ashish Saxena, Director of AKS IT Services The government’s stated vision of a 1 trillion digital economy by 2025 is ambitious but achievable, if we get the building blocks right. Of these, the one of cybersecurity is a curious one. Arguably, it is the greatest threat to the avowed vision but at the same time companies like AKS IT Services are doing remarkably well to address the challenges and pr...

Mitsubishi Electric Establishes Company-wide Framework for Reducing Cybersecurity Risks

On April 1, Mitsubishi Electric Corporation will establish the Product Security Incident Response Team (PSIRT) as a new company-wide framework dedicated to promptly and reliably responding to and reducing cybersecurity risks in products and related services in all divisions and branches. As the adoption of IoT continues to spread, the risk of products being exposed to cyber-attacks is rising.  Com...

Operations Cybersecurity Addressed by Engaging Engineering Disciplines

Overview In recent years, the term “operations technology,” or “OT,” has emerged to describe technology used to manage and control manufacturing processes and other industrial operations. Unfortunately, the precise definition of this term is often ambiguous. OT systems collect, store and process information and execute complex control algorithms to operate these facilities safely and reliably. The...