Alibaba Cloud – 11 layer security architecture


A major challenge for organizations is the increasing number of security threats and the rise of their complexity. The inter connectivity of devices over the Internet, both through IoT and mobility, makes it impossible for organizations to monitor and secure all devices. Cyber criminals have also become more sophisticated, with many online tools available for them to execute attacks. The capability gap between organizational security … Continue reading Alibaba Cloud – 11 layer security architecture

The digital world needs an “immune system.”


Chronicle was born in 2016 as a project within X, Alphabet’s moonshot factory. They see a future where enterprise security teams can find and stop cyberattacks before they cause harm. By applying planet-scale computing and analytics to security operations, Chronicle provide the tools teams need to secure their networks and their customers’ data. Stephen Gillett is the CEO​ and Co-Founder​ of Chronicle. Stephen joined Chronicle from Google​, … Continue reading The digital world needs an “immune system.”

Future of Cyber Security with Connected Car Security


The way typical IT organization protects their critical assets with various security technology solutions such as two factor authentication, anti-virus protection, firewalls, intrusion detection systems, DDoS protections and many other technologies. The time has come now to shift the attention to other connected devices that are no more avoidable in everyone’s life Over the past few years, relevant government agencies have also produced reports and … Continue reading Future of Cyber Security with Connected Car Security

Securing Container workloads for Enterprise


What are containers?  Containers represent a transformational change in the way apps are built and run. Containers package an application and all its dependencies into a single image that can be promoted from development, to test, to production, without change. Containers provide consistency across environments and multiple deployment targets: physical servers, virtual machines (VMs), and private or public cloud Containers enable customers to simplify multi-tenancy … Continue reading Securing Container workloads for Enterprise

Future of Work – Increasing cyber risk is challenging traditional employment models


Work is changing. Globalisation, technological progress and Demographic changes are having a profound impact on labour markets, affecting both the quantity and quality of jobs that are available, as well as how and by whom they are carried out. The way we work is changing. As new technologies continue to unfold in the workplace, more than a third of jobs are likely to require skills … Continue reading Future of Work – Increasing cyber risk is challenging traditional employment models

How Tata can regain the telecom market in India


India Telecommunication market has huge potential due to various factors With a subscriber base of nearly 1,210.71 million, as of July 2017, India accounted for the 2nd largest telecom network in the world. With 431.21 million internet subscriber, as of June 2017, India stands 2nd highest in terms of total internet users Mobile based Internet is a key component of Indian Internet usage, with 7 … Continue reading How Tata can regain the telecom market in India

Open Source Hardware – its Cost Reduction for many enterprise business


Large enterprise, cloud service providers, ‘big brand’ product companies are spending millions or billions of dollars in building their data center. So what do you think keeping these companies technology imperatives moving forward. Are they going to focus on hybrid controllers, traffic shaping, 100G, network modeling, network analytics and simulation, circuit automation and testing, backbone and edge traffic engineering, passive and active monitoring, configuration automation … Continue reading Open Source Hardware – its Cost Reduction for many enterprise business