Type to SearchView Tags
Next-Gen Enterprise | Cybersecurity

Blog Category Listing

How Hybrid Zero Trust Security Model Saves the Day
126
How can you move closer to a Zero Trust security model, or isolate the network for all of your critical assets? A recent concept, “browser isolation,” is designed to meet these needs, and has become a great tool to help organizations move closer to...
The Changing Role of a Risk Manager Post-Pandemic
13

Sep 08, 2020

The Changing Role of a Risk Manager Post-Pandemic

Manmohan Singh General Manager ,Cybersecurity & GRC

Needless to say that the current pandemic situation is a once in a lifetime event. This massive disruption has changed the operating models of many organizations across different industry verticals and forced them to re...
DRIVING AGILITY
134

Aug 26, 2020

Driving agility & rapid deployments with HCL SAPStudio for Google Cloud

Gaurav Bharara Head of Google Cloud Practice and Delivery

HCL SAPStudio for Google Cloud is a ready-to-deploy IP based on HCL’s vast experience in assisting organizations to execute their SAP digital transformation journey. In this blog, Gaurav highlights how HCL SAPStudio enables a rapid...
Third-Party Risk Management
1,409

Jul 20, 2020

Third-Party Risk Management in Pandemic Situation

Chandrashekhar Moharir Group Manager, GRC Consulting Practice

Adopting a more holistic, resilient approach to third-party risk management (TPRM) will help organizations become more proactive, precautionary, and prescriptive with their cybersecurity initiatives. Events, such as the COVID-19 pandemic, can have a...
Recognize ‘Normal’
321
To paraphrase a well-known cliché, either you have been breached or you will be breached. You might not be able to prevent infiltration by malicious intent, but you can recognize abnormal versus normal and react quickly...
 Discovery Automation Journey
165
Microsoft withdrew its support for Windows Server 2008 and 2008 R2 in January this year. This also translates among other things, an end to the regular security updates from Microsoft. This means the infrastructure and by extension, the applications...
Artificial Intelligence
288

Jun 29, 2020

Artificial Intelligence: Revolutionizing Banking with Predictive Analytics

Ashutosh Uniyal Associate Vice President, Financial Services, ANZ

With the advent of emergent technologies such as AI and automation, coupled with the global need for digital transformation, banks have reached a point where future-facing, proactive changes are no longer value additions but are indeed key...
User security awareness training
927
What an attacker is looking to exploit in a phishing attack is a lack of user knowledge, which makes user awareness the most important step in preventing such breaches. The key component of a successful phishing attack is user interaction. A user...
IT-OT Convergence
256

Jun 09, 2020

Three Ways IT-OT Convergence is Driving Business Transformation

Jatin Singhal Sales Director, Sweden, HCL Technologies

IT-OT convergence has been the cornerstone of the success of Industry 4.0. Find out some real-life use cases cutting across industries, where IT-OT convergence is delivering significant business outcomes.
first global pandemic
2,508

Mar 27, 2020

As “WFH-20” goes viral, how do you fend off new cyber security threats?

Maninder Singh Corporate Vice President, CyberSecurity & GRC

With the breakout of the first Global Pandemic in a hundred years we will see many ideas of 21st century which society has been toying with for over two decades bubble to the top. These will include a greater emphasis on dietary changes, lowering...
How Hybrid Zero Trust Security Model Saves the Day
126
How can you move closer to a Zero Trust security model, or isolate the network for all of your critical assets? A recent concept, “browser isolation,” is designed to meet these needs, and has become a great tool to help organizations move closer to...
Third-Party Risk Management
1,409

Jul 20, 2020

Third-Party Risk Management in Pandemic Situation

Chandrashekhar Moharir Group Manager, GRC Consulting Practice

Adopting a more holistic, resilient approach to third-party risk management (TPRM) will help organizations become more proactive, precautionary, and prescriptive with their cybersecurity initiatives. Events, such as the COVID-19 pandemic, can have a...
DRIVING AGILITY
134

Aug 26, 2020

Driving agility & rapid deployments with HCL SAPStudio for Google Cloud

Gaurav Bharara Head of Google Cloud Practice and Delivery

HCL SAPStudio for Google Cloud is a ready-to-deploy IP based on HCL’s vast experience in assisting organizations to execute their SAP digital transformation journey. In this blog, Gaurav highlights how HCL SAPStudio enables a rapid...
Recognize ‘Normal’
321
To paraphrase a well-known cliché, either you have been breached or you will be breached. You might not be able to prevent infiltration by malicious intent, but you can recognize abnormal versus normal and react quickly...
Securing Buisness
397
Businesses along with less effected ones are trying to make a steep uphill climb to ensure their survival. BCP and crisis management teams are working tirelessly to reorient business to follow lockdown and quarantine procedures. With hundreds and...
Risk Management
842
Blockchain is rapidly developing into maturity. Three core features—autonomy, immutability, and transparency —drive the technology’s ability to disrupt business models across industries. Five IT risk sub-disciplines of significant interest when...
IBM
1,748
IBM i customers can get an assessment done through HCL’s framework and IP: Optimize-i. With 80% servers in need of Optimization, Optimize-i helps achieve higher performance typically saving 30-40% of overall TCO by leveraging the latest iSeries...
5 Reasons Why: "AI"
820
The blog lays out the top five reasons why AI acts as a double edged sword for Cyber Security in Financial Services. Written by Sudip Lahiri, Head of Financial Services for Europe, the blog contends that institutions must be careful to look at AI as...

Danger, Danger, Will Robinson! (or, How Hybrid Zero Trust Saves the Day)
Joseph Karas - Senior Consultant, CISSP | September 10, 2020
126 Views

How can you move closer to a Zero Trust security model, or isolate the network for all of your critical assets? A recent concept, “browser isolation,” is designed to meet these needs, and has become a great tool to help organizations move closer to Zero Trust. To navigate new risks and ever-more-mobile environments, we need to adapt by adopting new processes and technologies that prevent failure, not to mention making the wrong kind of news as the latest perpetrator of security shortfalls.

You cannot have security without earned trust, and organizations don’t  become truly Zero Trust overnight. Some critical applications may never support Zero Trust. The key is a defense-in-depth approach with hybrid Zero Trust. 


The Changing Role of a Risk Manager Post-Pandemic
Manmohan Singh - General Manager ,Cybersecurity & GRC | September 8, 2020
13 Views

Needless to say that the current pandemic situation is a once in a lifetime event. This massive disruption has changed the operating models of many organizations across different industry verticals and forced them to re-think their business strategy. Most of the analyst firms and even World Economic Forum (WEF) Global risk report has constantly featured pandemics to be a high impact and likelihood risk. But clearly, it had not predicted the extent of damage that a pandemic could bring to the world. Risk managers now need to research and re-assess their risks as the dangers of pandemics are very different and impossible to ignore. Read this blog to know more. 


Driving agility & rapid deployments with HCL SAPStudio for Google Cloud
Gaurav Bharara - Head of Google Cloud Practice and Delivery | August 26, 2020
134 Views

HCL SAPStudio for Google Cloud is a ready-to-deploy IP based on HCL’s vast experience in assisting organizations to execute their SAP digital transformation journey. In this blog, Gaurav highlights how HCL SAPStudio enables a rapid delivery through a templatized approach backed by a dedicated team of Google Cloud and SAP-certified architects.