Type to SearchView Tags
Next-Gen Enterprise | Cybersecurity

Blog Category Listing

Preparing for a Future Built on IoT
18

Jul 15, 2021

Preparing for a Future Built on IoT

Doug Concepcion Solution Evangelist

Over time, the definition of IoT has changed considerably. Today, IoT has crossed new boundaries and can be found in nearly every possible item. And with its inherent network connectivity, it’s become a major source of real-time data collection and...
Building a Resilient Supply Chain in the Shadow of Digital Threats
100

Jul 14, 2021

Building a Resilient Supply Chain in the Shadow of Digital Threats

Andy Packham SVP & Chief Architect, HCL Microsoft Business Unit

In a monumental move towards greater organizational safety, the US government’s recent Cybersecurity Executive Order marks a major paradigm shift in the battle against digital threats. It not only indicates the critical importance of...
Outsourcing Data Privacy Services
34

Jul 13, 2021

Factors to Consider Before Outsourcing Data Privacy Services

Lisha Rodrigues Practice Lead, Cybersecurity & GRC Services

Organizations are bewildered because of the multiple data privacy regulations popping up across countries. Even though the common privacy principles across these regulations remain the same, the real greater challenge is not having the required...
Cyber Resiliency with HCL Rubrik Solutions
158

Jul 09, 2021

Cyber Resiliency with HCL Rubrik Solutions

Sarthak Sharma Product Management Group, NGDC Practice

This blog details the impact of cyberattacks on digital enterprises, particularly those that have occurred in various types and forms post the onset of the pandemic. To counter the threat of cyber-attacks and enable organizations to adopt the...
Colonial Pipeline Breach
176

Jun 14, 2021

Colonial Pipeline Breach: “Call For Action”

Amit Jain Global Sales Head & Senior Vice President, Cybersecurity & GRC Services

The world as we know it runs on an invisible yet critical essential infrastructure. From power plants to national energy grids to oil supply lines – these complex systems enable and protect our way of life. And when everything is working – they are...
Combating Digital Risks
69

Jun 14, 2021

Combating Digital Risks

Kaustubh Chaturvedi Senior Executive, Cybersecurity Practice

Digital transformation and hyper-connected enterprise architectures are not new and have been around for more than a decade. Enter the pandemic and something has changed – it is now slowly becoming the status quo. It is the increased importance (now...
IoT Exposure_Syam
87

Jun 14, 2021

Mitigating the ‘Dark Side’ of IoT Exposure

Syam Thommandru CyberSecurity Product Management

Colonial Pipeline, which operates a 5,500=kilometer pipeline running from Texas to New York in the U.S., was forced to shut after being hit by a ransomware attack by Russia-based hacker gang DarkSide.
Digital Risk Protection for Enhancing IT Security
72

Jun 08, 2021

Digital Risk Protection for Enhancing IT Security

Syam Thommandru CyberSecurity Product Management

The year 2020 has been life-changing for all - from businesses to the common man. Everyone and everything went virtual, increasing the perimeters and opportunities for cyber incursions. The threat landscape not only expanded, but it also evolved at...
Role of CIAM for Simplified Digital Customer Experience
103
Digital transformation was never this fast and in such high demand before. Call it irony or a turn of fate, post-COVID-19 companies are speeding up digitization both at the operational and customer-facing level. McKinsey reveals that the...
Cyber Resiliency with HCL Rubrik Solutions
158

Jul 09, 2021

Cyber Resiliency with HCL Rubrik Solutions

Sarthak Sharma Product Management Group, NGDC Practice

This blog details the impact of cyberattacks on digital enterprises, particularly those that have occurred in various types and forms post the onset of the pandemic. To counter the threat of cyber-attacks and enable organizations to adopt the...
Building a Resilient Supply Chain in the Shadow of Digital Threats
100

Jul 14, 2021

Building a Resilient Supply Chain in the Shadow of Digital Threats

Andy Packham SVP & Chief Architect, HCL Microsoft Business Unit

In a monumental move towards greater organizational safety, the US government’s recent Cybersecurity Executive Order marks a major paradigm shift in the battle against digital threats. It not only indicates the critical importance of...
first global pandemic
4,358

Mar 27, 2020

As “WFH-20” goes viral, how do you fend off new cyber security threats?

Maninder Singh Corporate Vice President, CyberSecurity & GRC

With the breakout of the first Global Pandemic in a hundred years we will see many ideas of 21st century which society has been toying with for over two decades bubble to the top. These will include a greater emphasis on dietary changes, lowering...
CYBERSECURITY TRENDS IN 2021 AND BEYOND
134

May 14, 2021

CYBERSECURITY TRENDS IN 2021 AND BEYOND

Kinsuk Mitra Director of Finance, Risk and Compliance

With rapid IT changes and complexity, the last 3 years have seen an increase in cybsersecurity spending with identity and access management (IAM), cyber monitoring and endpoint and network security being the key areas of expenditure. For financial...
5 security threats you must be aware of in the hybrid workplace
238

May 06, 2021

5 security threats you must be aware of in the hybrid workplace

Rakshit Ghura Vice President & Global Head - Digital Workplace Services

The pandemic played a key role in forcing businesses to migrate their business application and infrastructure into cloud for building digital resilience. While the adoption of technology has been a boon, data touchpoints are now more spread out than...
Outsourcing Data Privacy Services
34

Jul 13, 2021

Factors to Consider Before Outsourcing Data Privacy Services

Lisha Rodrigues Practice Lead, Cybersecurity & GRC Services

Organizations are bewildered because of the multiple data privacy regulations popping up across countries. Even though the common privacy principles across these regulations remain the same, the real greater challenge is not having the required...
Artificial Intelligence
604

Jun 29, 2020

Artificial Intelligence: Revolutionizing Banking with Predictive Analytics

Ashutosh Uniyal Associate Vice President, Financial Services, ANZ

With the advent of emergent technologies such as AI and automation, coupled with the global need for digital transformation, banks have reached a point where future-facing, proactive changes are no longer value additions but are indeed key...
Five key websites
247

Jan 13, 2021

Five key websites that track known security vulnerabilities

Erik Goldoff CISSP CyberSecurity Consultant, Technical Architect

Endpoint security has seen great advances over the years, from simple scans using signature technology to multi-layered protection and a slew of variations. Even with increasingly sophisticated solutions, it’s important to understand your...
Colonial Pipeline Breach
176

Jun 14, 2021

Colonial Pipeline Breach: “Call For Action”

Amit Jain Global Sales Head & Senior Vice President, Cybersecurity & GRC Services

The world as we know it runs on an invisible yet critical essential infrastructure. From power plants to national energy grids to oil supply lines – these complex systems enable and protect our way of life. And when everything is working – they are...

Preparing for a Future Built on IoT
Doug Concepcion - Solution Evangelist | July 15, 2021
18 Views

Over time, the definition of IoT has changed considerably.

Today, IoT has crossed new boundaries and can be found in nearly every possible item. And with its inherent network connectivity, it’s become a major source of real-time data collection and exchange. As the world becomes increasingly connected, there is a natural six-degrees of separation between most devices on the global internet. From personal devices to commercial devices, and from wearables to healthcare – we’re witnessing the boom of IoT in consumer as well as industrial applications.


Andy Packham

Building a Resilient Supply Chain in the Shadow of Digital Threats
Andy Packham - SVP & Chief Architect, HCL Microsoft Business Unit | July 14, 2021
100 Views

In a monumental move towards greater organizational safety, the US government’s recent Cybersecurity Executive Order marks a major paradigm shift in the battle against digital threats. It not only indicates the critical importance of cybersecurity for organizational and national security but is an essential step towards safeguarding critical enterprises and infrastructure in an increasingly dangerous digital landscape.

By deploying a standardized playbook for the federal response to cyber incidents, this Order will allow the government to upgrade and secure cloud services and other cyberinfrastructure. The establishment of a “Cybersecurity Safety Review Board”, comprised of public and private sector officials, will ensure a multifaceted analysis of cyberattacks and provide recommendations in a timely manner. Furthermore, the Order fosters a spirit of cooperation and data-sharing within the government and external corporate entities for a wider endpoint to endpoint detection and response system.


Lisha Rodrigues

Factors to Consider Before Outsourcing Data Privacy Services
Lisha Rodrigues - Practice Lead, Cybersecurity & GRC Services | July 13, 2021
34 Views

Organizations are bewildered because of the multiple data privacy regulations popping up across countries. Even though the common privacy principles across these regulations remain the same, the real greater challenge is not having the required competency and resources to meet the mandated privacy requirements. One of the best ways to tackle this challenge is to outsource data privacy services. Contrary to the popular belief, outsourcing privacy services has various direct and indirect benefits such as secure processing of data, reduced overhead costs, improved business efficiency, access to expert recommendations that comply with regulatory requirements and help improve brand trust, etc.