How to Address The Trust Issues in The CloudBy Goutham Y Kumar On 29 Sep 2016
Cloud computing has brought in tremendous opportunities to the IT world. Startups to large enterprises view cloud as a desirable option, thanks to the advantages of resource sharing, on demand provisioning and pay per use model. As we all know,...
What is Happening in the Cyber Threat Landscape?By Jyothi Babu Thummala On 28 Sep 2016
Cyber-crimes are becoming increasingly sophisticated and ambitious in the current age of advanced persistent threats, zero- day attacks and advanced malware. Highly sophisticated threat actors are focused on stealing confidential information including intellectual property, PII, Credit card information, medical records,...
Design Thinking for Collaboration and EmpathyBy Adarsh Halwe On 26 Sep 2016
The IT world is witnessing a sea of changes in terms of new business models as well as technologies. However, for any organization, the challenge lies in structuring an IT organization and strategically managing the product/ service delivery expectations of...
Security Operations Center – The Heart of Effective DetectionBy Karthik Palanisamy On 15 Sep 2016
Organizations around the world are facing cyber-attacks at regular frequency. Technology is evolving and so are safe guards, however, the threat perception is changing only for the worse. Even the latest security software and solutions have still not been able...
Creating and Maintaining a Security Operations Center (SOC)By Karthik Palanisamy On 15 Sep 2016
In recent times organizations have realized that IT security cannot be treated as a surrogate function and it has started to get the respect it deserves. IT security as a whole and IT Security Operation centers, in particular, are getting...
These blogs might interest you
by Viswanath Subramaniam on 29 Mar 2019
by Yogesh Thippeswamy on 28 Mar 2019
by Arsalaan Kashif on 15 Mar 2019
by Jason Chandralal on 12 Mar 2019
Subscribe for blog updates