Type to SearchView Tags
Next-Gen Enterprise | Cybersecurity

Blog Category Listing

Process Utility
49

Feb 05, 2021

Acing Third-Party Risk Management With Limited Resources

Manmohan Singh General Manager ,Cybersecurity & GRC

How a business manages its third-party relationships has a direct, sometimes even exponential, bearing on shareholder value in an organization, depending on the level of engagement and the type of services provided! And yet, despite the growing...
hybrid environment
87
Over the last few years, cloud adoption has become increasingly central to organizations undergoing a digital transformation. In fact, a recent Gartner report noted that cloud adoption is among the fastest-growing IT investments across industries....
Age of Remote Workplaces
94
With the recent vast increase in the need for remote workplaces and the resulting expansion of the potential attack field, it’s even more important to build your own Fort Knox to provide environment-wide security. Using the right tools in the right...
Five key websites
138

Jan 13, 2021

Five key websites that track known security vulnerabilities

Erik Goldoff CISSP CyberSecurity Consultant, Technical Architect

Endpoint security has seen great advances over the years, from simple scans using signature technology to multi-layered protection and a slew of variations. Even with increasingly sophisticated solutions, it’s important to understand your...
Cloud
88
The article highlights the current trends in Financial Services and provides an insight on what could be the new focus areas for Financial Services across the globe going forward in 2021.
Network Protection
112

Dec 11, 2020

Should Network Protection Focus on Security or Availability?

Josh Wickern Network Security Practice Lead and Technical Architect

Virtually all organizations understand that network security policies are essential if they want to protect their lifeline— the network. When creating network cybersecurity policies, organizations lean in one of two directions— security-focused or...
Fraudsters at the door
67

Dec 09, 2020

Going Digital while stopping Fraudsters at the door

Joe Joseph Head of Risk and Compliance practice

Account opening is a critical process in a Financial Institution (FI), where verifying the identity of potential customers is a regulatory KYC mandate. While lapses in this process may result in large fraud related financial losses, it could also be...
Data Loss Protection
209

Nov 30, 2020

Measuring Success: Data Loss Protection (DLP) Program Maturity - Part Two

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

DLP program maturity levels may need to change to meet your organizational needs – but how can you adapt them to your enterprise, your needs, and your evolving cybersecurity challenges? Putting real-world parameters around the numerical system for...
Leave Security Vulnerable?
232
The unfathomable spirit of the human race to cope up with any situation has changed the course of history multiple times. Be it the invention of fire or the wheel, mankind has always retaliated to situations with the appropriate response over...
first global pandemic
3,750

Mar 27, 2020

As “WFH-20” goes viral, how do you fend off new cyber security threats?

Maninder Singh Corporate Vice President, CyberSecurity & GRC

With the breakout of the first Global Pandemic in a hundred years we will see many ideas of 21st century which society has been toying with for over two decades bubble to the top. These will include a greater emphasis on dietary changes, lowering...
Third-Party Risk Management
1,820

Jul 20, 2020

Third-Party Risk Management in Pandemic Situation

Chandrashekhar Moharir Group Manager, GRC Consulting Practice

Adopting a more holistic, resilient approach to third-party risk management (TPRM) will help organizations become more proactive, precautionary, and prescriptive with their cybersecurity initiatives. Events, such as the COVID-19 pandemic, can have a...
Process Utility
49

Feb 05, 2021

Acing Third-Party Risk Management With Limited Resources

Manmohan Singh General Manager ,Cybersecurity & GRC

How a business manages its third-party relationships has a direct, sometimes even exponential, bearing on shareholder value in an organization, depending on the level of engagement and the type of services provided! And yet, despite the growing...
Age of Remote Workplaces
94
With the recent vast increase in the need for remote workplaces and the resulting expansion of the potential attack field, it’s even more important to build your own Fort Knox to provide environment-wide security. Using the right tools in the right...
IT-OT Convergence
470

Jun 09, 2020

Three Ways IT-OT Convergence is Driving Business Transformation

Jatin Singhal Sales Director, Sweden, HCL Technologies

IT-OT convergence has been the cornerstone of the success of Industry 4.0. Find out some real-life use cases cutting across industries, where IT-OT convergence is delivering significant business outcomes.
Cloud
88
The article highlights the current trends in Financial Services and provides an insight on what could be the new focus areas for Financial Services across the globe going forward in 2021.
Business and IT Leaders
7,695
Is your security “dynamic” enough? Is your business confident in the ability of its cybersecurity systems to offer protection against the global outbreak? Are your customers convinced that their confidential and personal data is secure with you? Are...
IBM
1,894
IBM i customers can get an assessment done through HCL’s framework and IP: Optimize-i. With 80% servers in need of Optimization, Optimize-i helps achieve higher performance typically saving 30-40% of overall TCO by leveraging the latest iSeries...
Data Quality
413
The blog aims at providing an insight as to why Data Quality is crucial for Industrial manufacturing segment talking about three major reasons in detail, and how we at HCL-ERS-Technology Office have addressed it.

Acing Third-Party Risk Management With Limited Resources
Manmohan Singh - General Manager ,Cybersecurity & GRC | February 5, 2021
49 Views

How a business manages its third-party relationships has a direct, sometimes even exponential, bearing on shareholder value in an organization, depending on the level of engagement and the type of services provided! And yet, despite the growing complexity and the ever-evolving nature of threats within the enterprise, only a handful of companies invest adequately in the vendor risk management function. While the risk function needs to mature across the global business ecosystem, the digitization of risk is causing a significant shift in Third-Party Risk Management (TPRM) models.


What does Accelerated Cloud Adoption mean for Enterprise Security?
S Sreekumar - Global Practice Director, Cybersecurity | January 29, 2021
87 Views

Over the last few years, cloud adoption has become increasingly central to organizations undergoing a digital transformation. In fact, a recent Gartner report noted that cloud adoption is among the fastest-growing IT investments across industries. The COVID-19 pandemic has only accelerated this trend. The reason? The urgent need for secure, digital workspaces for a staggeringly large remote workforce. So, what does this accelerated cloud adoption mean for enterprise security?


Building Your Environment’s Fort Knox in the Age of Remote Workplaces
Eric Cox - Senior Cybersecurity Consultant, Symantec Global Consulting | January 28, 2021
94 Views

With the recent vast increase in the need for remote workplaces and the resulting expansion of the potential attack field, it’s even more important to build your own Fort Knox to provide environment-wide security. Using the right tools in the right way reduces the likelihood of attacks on remote workers and their connections to your environment.

From the components of effective attack prevention strategies to supplementing with reporting and alerting, this practical approach provides guidance for research, solution strategies, what resources to tap for improving performance and strength of the security platform, and the importance for all levels of management to understand the benefits and tools available for a powerful and agile environment that supports the business.