How to Address The Trust Issues in The CloudBy Goutham Y Kumar On 29 Sep 2016
Cloud computing has brought in tremendous opportunities to the IT world. Startups to large enterprises view cloud as a desirable option, thanks to the advantages of resource sharing, on demand provisioning and pay per use model. As we all know,...
What is Happening in the Cyber Threat Landscape?By Jyothi Babu Thummala On 28 Sep 2016
Cyber-crimes are becoming increasingly sophisticated and ambitious in the current age of advanced persistent threats, zero- day attacks and advanced malware. Highly sophisticated threat actors are focused on stealing confidential information including intellectual property, PII, Credit card information, medical records,...
Design Thinking for Collaboration and EmpathyBy Adarsh Halwe On 26 Sep 2016
The IT world is witnessing a sea of changes in terms of new business models as well as technologies. However, for any organization, the challenge lies in structuring an IT organization and strategically managing the product/ service delivery expectations of...
Security Operations Center – The Heart of Effective DetectionBy Karthik Palanisamy On 15 Sep 2016
Organizations around the world are facing cyber-attacks at regular frequency. Technology is evolving and so are safe guards, however, the threat perception is changing only for the worse. Even the latest security software and solutions have still not been able...
Creating and Maintaining a Security Operations Center (SOC)By Karthik Palanisamy On 15 Sep 2016
In recent times organizations have realized that IT security cannot be treated as a surrogate function and it has started to get the respect it deserves. IT security as a whole and IT Security Operation centers, in particular, are getting...
These blogs might interest you
by Chetan Deshpande on 20 Aug 2018
by Sharon Andrew on 17 Aug 2018
by Sangram Sawant on 25 Jul 2018
by Rajiv Peddada on 22 May 2018
Subscribe for blog updates