Risk and Compliance Monitoring in the CloudBy Raghuram Gorur On 8 Nov 2016
In today’s digital landscape, majority of an organization’s data is stored electronically; in fact a lot of organizations have started moving towards cloud technology to store data. Cloud computing over years has rapidly grown into a significant delivery method for...
Tips to Choosing The Right Enterprise Security VendorBy Raghuram Gorur On 2 Mar 2016
The stakes are high indeed when it comes to enterprise security. A single breach can have a plethora of effect on a company, resulting in financial and reputational damage. The hard fact is that enterprise security is something we cannot...
Network Security: A Key ImperativeBy Raghuram Gorur On 20 Jan 2016
Network security refers to the set of activities or measures taken to protect your office/ company network and ensure network threat management and remediation. Network security ensures that a network is protected while sending, receiving and storing data and identifies...
Emerging Trends in Network SecurityBy Raghuram Gorur On 20 Jan 2016
‘We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them?’,  asks the FBI in its cybercrime page. With 2015 showing an alarming increase not just in...
Staying Afloat During a Cyber-AttackBy Raghuram Gorur On 20 Jan 2016
Given the rising frequency of increasingly malicious and innovative cyber-attacks, one can safely conclude that cyber risk is here to stay. It is no longer a question of ‘if’ but ‘when’ your organization will have to deal with a cyber-attack....
These blogs might interest you
by Adarsh BU on 23 May 2022
by Chamale Shettar on 28 Apr 2022
by Debabrata Goswami on 12 Apr 2022
by Ajay Agrawal on 28 Mar 2022
Subscribe for blog updates