Skip to main content Skip to main navigation Skip to search Skip to footer
Type to Search Subscribe View Tags
Next-Gen Enterprise | Cybersecurity
New-Age Cybersecurity

Jan 17, 2019

New-Age Cybersecurity in the Digitalized Banking Paradigm

Maninder Singh - Corporate Vice President - CyberSecurity Services
Corporate Vice President - CyberSecurity Services
Bothered by the massive breaches of personal data frequently highlighted in the news? But they’re not the only risks financial services firms are encountering today. Online theft of funds along with ransomware and malware attacks disrupt banking...
20
The Custodian Affair

Nov 29, 2018

The Custodian Affair

Ahana Anil - Global Engagement Manager
Global Engagement Manager
Embracing big data analytics, AI and robotics is required for the custodians to exist in the market place which would mean that custodians will have to act more like the tech firms and thus require a different talent-pool for the same.
45
Trap

Nov 20, 2018

It’s a Trap! Secure your organisation from Phishing attacks

S Sreekumar - Global Practice Director, Cybersecurity
Global Practice Director
Emails have become the de-facto way of doing business whether inter-organizational or intra-organizational. In recent times there have been many news headlines of data breaches across the globe, the majority of them attributed to sources originating...
121
application security

Nov 19, 2018

How good is your application security program?

Ramesh BV - Product Manager, Cybersecurity Practice
Product Manager
Protecting sensitive information is critical for an organization to secure itself from cyber attacks, stay competitive and meet regulatory requirements. Application security plays a vital role in the early detection and resolution of any...
103
Securing against AI

Nov 12, 2018

Securing against AI and IoT Bias via Convergence

Gaurav Sharma - GM & Head-NGDC PMG
GM & Head-NGDC PMG
Security has remained on top of different charts for decades and has seen various avatars as we tried changing for good every time. As we face more technological influence in all parts of our life today than ever, the challenge now is to make...
51
Integrated Governance Risk

Nov 12, 2018

Why An Integrated Governance Risk and Compliance System is Paramount

Suhas Krishnamoorthy - Associate – Governance, Risk & Compliance Practice
Associate
The current generation of advanced technologies such as Artificial Intelligence, Machine Learning, Internet of Things, Data Warehousing etc. are high-risk technologies in terms of security and requires a proactive Governance, Risk management and...
70
Evolving Cybersecurity Framework

Nov 12, 2018

Why Enterprises Should Have An Evolving Cybersecurity Framework

Vinamra Shukla - Presales Consultant, EN- Presales, Infrastructure Services Division
Presales Consultant
Cybersecurity is a buzzword these days in the boardroom of almost all enterprises. With the proliferation of sensors, IoT technologies and fast computing environment, vulnerability attacks and breaches are on spike resulting in huge losses to the...
56
Artificial Intelligence for Threat Intelligence

Nov 12, 2018

Leveraging Artificial Intelligence for Threat Intelligence

Anirudh Murali - Associate Consultant - Governance, Risk & Compliance Practice
Associate Consultant
Today’s cyber threats are ever evolving and security practitioners struggle to stay one step ahead of adversaries. Containing threats in the current landscape has now become a cat-and-mouse game between security vendors and cyber criminals....
18
Blockchain-Fueled Data Security

Nov 12, 2018

The Rise of Blockchain-Fueled Data Security

Andrew Stephen - Senior Manager, Digital & Analytics Practice
Senior Manager
We have reached an inflection point in the development of technology and its application in business. The systems that we currently use have become so complex that we are begining to experience the law of unintended consequences. With the...
19

Pages

Integrated Governance Risk

Nov 12, 2018

Why An Integrated Governance Risk and Compliance System is Paramount

Suhas Krishnamoorthy - Associate – Governance, Risk & Compliance Practice
Associate
The current generation of advanced technologies such as Artificial Intelligence, Machine Learning, Internet of Things, Data Warehousing etc. are high-risk technologies in terms of security and requires a proactive Governance, Risk management and...
70
IBM

May 18, 2018

HCL's Unique IP Optimize-i: The Solution to Cloud Challenge for IBM i (AS/400) and iSeries

Ravinder Pal - General Manager & Global Head – IBM i (AS/400) Practice & Presales
IBM i customers can get an assessment done through HCL’s framework and IP: Optimize-i. With 80% servers in need of Optimization, Optimize-i helps achieve higher performance typically saving 30-40% of overall TCO by leveraging the latest iSeries...
617
Business and IT Leaders

Jul 19, 2017

Five reasons why enterprise leaders should be looking at Dynamic Cybersecurity

Maninder Singh - Corporate Vice President - CyberSecurity Services
Corporate Vice President - CyberSecurity Services
Is your security “dynamic” enough? Is your business confident in the ability of its cybersecurity systems to offer protection against the global outbreak? Are your customers convinced that their confidential and personal data is secure with you? Are...
2,533
Evolution of Business Continuity

Nov 12, 2018

Evolution of Business Continuity in Digital Age

Vishal Bajpai - Senior Technical Lead
Senior Technical Lead
In today's ever evolving threat landscape Business Continuity is not limited to just running uninterrupted business but rather a clear reminder of the critical importance of a proactive, integrated plan for cyber resilience that can support your...
63
Trap

Nov 20, 2018

It’s a Trap! Secure your organisation from Phishing attacks

S Sreekumar - Global Practice Director, Cybersecurity
Global Practice Director
Emails have become the de-facto way of doing business whether inter-organizational or intra-organizational. In recent times there have been many news headlines of data breaches across the globe, the majority of them attributed to sources originating...
121
The Custodian Affair

Nov 29, 2018

The Custodian Affair

Ahana Anil - Global Engagement Manager
Global Engagement Manager
Embracing big data analytics, AI and robotics is required for the custodians to exist in the market place which would mean that custodians will have to act more like the tech firms and thus require a different talent-pool for the same.
45
application security

Nov 19, 2018

How good is your application security program?

Ramesh BV - Product Manager, Cybersecurity Practice
Product Manager
Protecting sensitive information is critical for an organization to secure itself from cyber attacks, stay competitive and meet regulatory requirements. Application security plays a vital role in the early detection and resolution of any...
103
Securing against AI

Nov 12, 2018

Securing against AI and IoT Bias via Convergence

Gaurav Sharma - GM & Head-NGDC PMG
GM & Head-NGDC PMG
Security has remained on top of different charts for decades and has seen various avatars as we tried changing for good every time. As we face more technological influence in all parts of our life today than ever, the challenge now is to make...
51
Evolving Cybersecurity Framework

Nov 12, 2018

Why Enterprises Should Have An Evolving Cybersecurity Framework

Vinamra Shukla - Presales Consultant, EN- Presales, Infrastructure Services Division
Presales Consultant
Cybersecurity is a buzzword these days in the boardroom of almost all enterprises. With the proliferation of sensors, IoT technologies and fast computing environment, vulnerability attacks and breaches are on spike resulting in huge losses to the...
56

Pages

Contact Us
MAX CHARACTERS: 10,000

We will treat any information you submit with us as confidential.

We will treat any information you submit with us as confidential.

Sign in to Add this article to your Reading List
Register