By Sumana Iyengar, CEO & Co-Founder, Goavega Software Pvt. Ltd. The fintech ecosystem in India witnessed tremendous growth during the past few years owing to the improved access to smartphones…
Opinion / Blogs
-
-
By Alexandra Willsher, Senior Sales Engineer, Forcepoint The shift to hybrid working has made the cybersecurity environment more complex and perilous than ever before. With people working remotely, and billions…
-
By Alexandra Willsher, Senior Sales Engineer, Forcepoint The shift to hybrid working has made the cybersecurity environment more complex and perilous than ever before. With people working remotely, and billions…
-
By Nikhil Korgaonkar, Regional Director, Arcserve India & SAARC For years, the well-known security maxim was, “Trust but verify.” However, the statement is no longer sufficient. In today’s borderless, global,…
-
By Ramesh Umashankar, CEO – International Business, iValue InfoSolutions In recent years, the Asia-Pacific (APAC) region has become increasingly attractive to cybercriminals. According to IBM X-Force Threat Intelligence Index 2022,…
-
By Harish Kumar, Head, Enterprise & Government, Check Point Software Technologies, India & SAARC If the past year has taught businesses anything, it’s that the impact of targeted cyberattacks and…
-
The growing need to manage privileged access reflects the enormity of cybersecurity measures
by CIO AXISBy Rajarshi Bhattacharyya, Chairman and Managing Director, ProcessIT Global Soaring security incidents across industries are mainly due to unauthorised access by cybercriminals to the business organisation’s network, data, applications or devices.…
-
By Harikrishna Prabhu, COO, TechnoBind Digitisation has penetrated all areas of the modern world. Authentication is a key facilitator that contributes to maintaining the security aspects of the digitisation process.…
