Cybersecurity | HCL Blogs
Type to SearchView Tags
Next-Gen Enterprise | Cybersecurity

Blog Category Listing

Next Gen Audits
64
The word audit originates from the word ‘audire/auditus’ in Latin, which means ‘hearing.’ Originally, the audit reports were presented orally and thus the name. However, audits have come a long way from being just a verification methodology a couple...
Cybersecurity
1,159
The past decade has seen an exponential rise in the number of cyber-attacks affecting the IT and connected cyber systems of businesses across industries and geographical boundaries. No one is immune to the threat, and whilst the cost to economies is...
Plateauing Compliance
50
Sub Prime crisis heralded a new era of sharp focus in the compliance domain. Financial institutions worldwide suffered losses of over $300 billion due to compliance-related fines and damages. Since then, compliance has become mainstream for...
HPC
76
This article covers the perspective on the synergy of HPC and AI along with some prominent use cases where AI augments HPC workloads.
cyber risks
238

Nov 14, 2019

Five hard questions to ask about your cyber risks

Rajesh Thakur Senior Vice President & Business Head

More quickly than most people realize, the scale and seriousness of the cyberthreats companies face have changed. Many of the most expensive cybercrimes are growing now by triple digit percentages every year, with no end in sight. Why the...
GRC
363
While the Nordic organizations have always been attentive to evolving their risk and compliance regulations, they’ve faced several challenges while trying to effectively implement their GRC measures. These organizations still struggle with a 360-...
Real-time security
102

May 21, 2019

Real-time Security Approach

Jaibirsingh Jaswal Senior Product Manager, NGDC

The blog describes how next-gen data center can evolve its security parameters and eliminate its vulnerabilities that exist in the Hybrid Cloud Model.
Risk Management
552
Blockchain is rapidly developing into maturity. Three core features—autonomy, immutability, and transparency —drive the technology’s ability to disrupt business models across industries. Five IT risk sub-disciplines of significant interest when...
GRC
217
Today, in the second decade of the twenty-first century, enterprise leaders are confronted by regulatory and economic volatility on a scale that has not been experienced in generations. Accelerated by disruptive innovations, GRC challenges are...
Cybersecurity
1,159
The past decade has seen an exponential rise in the number of cyber-attacks affecting the IT and connected cyber systems of businesses across industries and geographical boundaries. No one is immune to the threat, and whilst the cost to economies is...
Next Gen Audits
64
The word audit originates from the word ‘audire/auditus’ in Latin, which means ‘hearing.’ Originally, the audit reports were presented orally and thus the name. However, audits have come a long way from being just a verification methodology a couple...
Business and IT Leaders
7,331

Jul 19, 2017

Five reasons why enterprise leaders should be looking at Dynamic Cybersecurity

Maninder Singh Corporate Vice President - CyberSecurity Services

Is your security “dynamic” enough? Is your business confident in the ability of its cybersecurity systems to offer protection against the global outbreak? Are your customers convinced that their confidential and personal data is secure with you? Are...
Plateauing Compliance
50
Sub Prime crisis heralded a new era of sharp focus in the compliance domain. Financial institutions worldwide suffered losses of over $300 billion due to compliance-related fines and damages. Since then, compliance has become mainstream for...
New-Age Cybersecurity
899

Jan 17, 2019

New-Age Cybersecurity in the Digitalized Banking Paradigm

Maninder Singh Corporate Vice President - CyberSecurity Services

Bothered by the massive breaches of personal data frequently highlighted in the news? But they’re not the only risks financial services firms are encountering today. Online theft of funds along with ransomware and malware attacks disrupt banking...
cyber risks
238

Nov 14, 2019

Five hard questions to ask about your cyber risks

Rajesh Thakur Senior Vice President & Business Head

More quickly than most people realize, the scale and seriousness of the cyberthreats companies face have changed. Many of the most expensive cybercrimes are growing now by triple digit percentages every year, with no end in sight. Why the...
Risk Management
552
Blockchain is rapidly developing into maturity. Three core features—autonomy, immutability, and transparency —drive the technology’s ability to disrupt business models across industries. Five IT risk sub-disciplines of significant interest when...
GRC
217
Today, in the second decade of the twenty-first century, enterprise leaders are confronted by regulatory and economic volatility on a scale that has not been experienced in generations. Accelerated by disruptive innovations, GRC challenges are...
Evolving Cybersecurity Framework
277
Cybersecurity is a buzzword these days in the boardroom of almost all enterprises. With the proliferation of sensors, IoT technologies and fast computing environment, vulnerability attacks and breaches are on spike resulting in huge losses to the...

Next-Gen Audits – Transforming a Validation Methodology into a Business Enabler
Suhas Krishnamoorthy - GRC Consultant | January 20, 2020
64 Views

The word audit originates from the word ‘audire/auditus’ in Latin, which means ‘hearing.’ Originally, the audit reports were presented orally and thus the name. However, audits have come a long way from being just a verification methodology a couple of years ago to now acting as a business enabler. Organizations are continually trying to improve their business processes by finding gaps w.r.t industry best practices and working towards them. Thus audit plays a vital role in uplifting the best practices of the organization.

The conventional IT audits had a standard questionnaire that had to be filled out to find out the gaps against the standard and pre-defined answers. The major drawback was that it was a static process and a reactive approach. The sampling technique used was merely random, and often this led to biases if not adequately sampled. The audit reports could also be tampered and skewed at the auditor’s will. All these drawbacks lead to the evolution of the next generations of auditing techniques.

The next-gen audit techniques involve the usage of Robotic Process Automation (RPA), Artificial Intelligence, Cognitive computing (CC), analytics, and blockchain. These technologies have a promising future for ensuring data integrity and efficient auditing. The below representation shows how the new-gen technologies can help to achieve the best auditing practice in an organization.


Cybersecurity - Looking ahead at the next decade: Why Abnormal should “NOT” remain the new Normal
Maninder Singh - Corporate Vice President - CyberSecurity Services | January 20, 2020
1159 Views

The past decade has seen an exponential rise in the number of cyber-attacks affecting the IT and connected cyber systems of businesses across industries and geographical boundaries. No one is immune to the threat, and whilst the cost to economies is significant, the cost to individual businesses can be disruptive. Often, the best antidote to every day stress that is induced by technology is better awareness and appropriate investments. The threat to personal and business data from hackers and dark actors is one such example. 


Plateauing Compliance Investment: Time to Rejig
Ruchir Gupta - Solutions Architect | January 14, 2020
50 Views

Sub Prime crisis heralded a new era of sharp focus in the compliance domain. Financial institutions worldwide suffered losses of over $300 billion due to compliance-related fines and damages. Since then, compliance has become mainstream for businesses, irrespective of their scale.

With new standards and regulations popping across the globe,McKinsey's report indicates that most C-Suites still feel less confident about their control of compliance risk. The reason they say is the "Incoherence in the overall effective organizational approach and weak business ownership of compliance" (Survey, 2018).

Since 2008, institutions started investing heavily in compliance, without really seeing the desired end product, as standards and regulations need their own time to catch up with the latest business approaches. The shifting focus on "Efficiency in Compliance" has become the new norm.

The first step is to create a baseline, McKinsey's "Compliance Benchmarking" of 22 leading institutes across Asia, Europe, and North America in 2017, followed by 24 institutes in 2018 of Global Systemically important (G-SIBs) and non-G-SIBs both participating led to the following inferences. 


Synergy of High Performance Computing and Artificial Intelligence
Heena Dua - Product Manager - PMG Group | December 24, 2019
76 Views

This article covers the perspective on the synergy of HPC and AI along with some prominent use cases where AI augments HPC workloads.


Five hard questions to ask about your cyber risks
Rajesh Thakur - Senior Vice President & Business Head- India & Middle East | November 14, 2019
238 Views

More quickly than most people realize, the scale and seriousness of the cyberthreats companies face have changed. Many of the most expensive cybercrimes are growing now by triple digit percentages every year, with no end in sight.

Why the underworld interest? Part of the reason is the same one the American bank robber Willie Sutton gave when asked why he robbed banks: because that’s where the money is. Over half the world’s population is now online, and their economic and social lives are now deeply connected to the Internet: the combined value of Facebook, Google, Amazon, and Apple stock is now greater than the Gross Domestic Product of France.


Streamlining Governance, Risk and Compliance (GRC) Challenges for Nordic Enterprises
Abhishek Ramavat - GRC Evangelist – Europe | June 25, 2019
363 Views

While the Nordic organizations have always been attentive to evolving their risk and compliance regulations, they’ve faced several challenges while trying to effectively implement their GRC measures. These organizations still struggle with a 360-degree view of their customer, struggle with accurate fault detection, lose efficiency due to manual efforts in compliance functions, and fail to access high quality customer data. Read the blog to know how Nordic businesses can streamline their GRC processes.


Real-time Security Approach
Jaibirsingh Jaswal - Senior Product Manager, NGDC | May 21, 2019
102 Views

The blog describes how next-gen data center can evolve its security parameters and eliminate its vulnerabilities that exist in the Hybrid Cloud Model.


Third Party Risk Management Using Blockchain
Suhas Krishnamoorthy - GRC Consultant | May 9, 2019
552 Views

Blockchain is rapidly developing into maturity. Three core features—autonomy, immutability, and transparency —drive the technology’s ability to disrupt business models across industries.

Five IT risk sub-disciplines of significant interest when embarking on a blockchain-driven transformation journey are: cyber and information risks, architecture and design risks, IT compliance risks, third-party and vendor risks, and integration risks.

Our blog post gives an overview of how blockchain can be put to use in third-party risk management.


Why an Integrated Governance, Risk and Compliance is Important?
Suhas Krishnamoorthy - GRC Consultant | May 9, 2019
217 Views

Today, in the second decade of the twenty-first century, enterprise leaders are confronted by regulatory and economic volatility on a scale that has not been experienced in generations. Accelerated by disruptive innovations, GRC challenges are continuously evolving at a breakneck pace, with transformative consequences for the global marketplace. To cope with the emerging challenges, risk specialists suggest adopting a robust GRC solution. Read our blog post to know about the benefits of a next-gen GRC solution.


5 Reasons Why: "AI" - A Double-edged Sword for Cybersecurity in Financial Services
Sudip Lahiri - Head - Financial Services, Europe | February 14, 2019
655 Views

The blog lays out the top five reasons why AI acts as a double edged sword for Cyber Security in Financial Services. Written by Sudip Lahiri, Head of Financial Services for Europe, the blog contends that institutions must be careful to look at AI as an enabler, rather than a replacement for human intervention.