Cybersecurity | HCLTech Blogs

Filter By:

Mar 07, 2023

Offensive security with Managed Attack Path Simulation (MAPS)

By:

Kaustubh Chaturvedi, Senior Executive, Cybersecurity Practice

Introducing the attacker’s perspective for securing the modern enterprise “True cyber security is preparing for what’s next, not what was last.” – Neil Rerup, President and Chief Security Architect of Enterprise Cyb

Feb 07, 2023

Strengthen Cyber Resilience with HCLTech’s VaultNXT, Powered by Cohesity

By:

Kapil Tiwari, General Manager – Product Management Lead–Hybrid Cloud Business Unit

Enterprises need to enhance their cyber resilience posture to become more confident in the protection of their critical data. This requires them to change their approach from threat detection to a holistic cybersecurity strategy. Explore how HCLTech…
The term 'forensic’ revolves around usage of methods and techniques to investigate crime or examine evidence. It is not wrong to describe it as “Usage of science in decoding evidence for better investigative procedures”.

Dec 09, 2022

Redefining Cyber resiliency for Next-Gen data protection

By:

Sumit Godiyal, Group Manager, Hybrid Cloud Business

With the increasing digital exposure, data security is becoming more critical than ever.
In the first part of my blog, I discussed emerging security threats creating new opportunities for cybercriminals in a hybrid set-up of work and why old assumptions will not keep us secure in the new world.
Cloud adoption cannot wait.
The global pandemic has adversely affected the world of work, making resilience an absolute necessity. All the credit goes to technology for empowering workers to adapt to hybrid or remote working under unprecedented circumstances.

Nov 21, 2022

Leveraging AI Techniques for Elevated IT Risk Management

By:

Mayank Trivedi, Associate Director, Cybersecurity & GRC Services

Abstract

Nov 21, 2022

Embark on a journey to SOC 2 Program

By:

Mayank Trivedi, Associate Director, Cybersecurity & GRC Services

It has been over a decade since SOC 2 was introduced to the audit world and organizations across the world slowly adopted its ways of working and the trust principles embedded in the program.