The untold story about ‘bitcoin’ – #cyberattack


Bitcoin is no stranger to controversy. It has weathered various storms over its security. But that is no guarantee that bitcoin will cope well in the future. One of Japan’s largest cryptocurrency exchanges has revealed that it’s lost nearly $400 million in a security breach. Coincheck says that it has restricted deposits and withdrawals for a cryptocurrency called NEM. Marko Kobal, co-founder of NiceHash, the Slovenian startup … Continue reading The untold story about ‘bitcoin’ – #cyberattack

The digital world needs an “immune system.”


Chronicle was born in 2016 as a project within X, Alphabet’s moonshot factory. They see a future where enterprise security teams can find and stop cyberattacks before they cause harm. By applying planet-scale computing and analytics to security operations, Chronicle provide the tools teams need to secure their networks and their customers’ data. Stephen Gillett is the CEO​ and Co-Founder​ of Chronicle. Stephen joined Chronicle from Google​, … Continue reading The digital world needs an “immune system.”

Transform your ‘Security Operations Center’


CIOs can take control to secure from the data breaches. Over a decade the cyber security landscape has evolved rapidly and the magnitude of cyber-attacks increased ever before. The future of information security threats will continue to accelerate massively, endangering the integrity and reputation of trusted organisations. This week, the industry experts at Davos WEF 2018 witnessed several cyber security trends and developments including the … Continue reading Transform your ‘Security Operations Center’

Securing Container workloads for Enterprise


What are containers?  Containers represent a transformational change in the way apps are built and run. Containers package an application and all its dependencies into a single image that can be promoted from development, to test, to production, without change. Containers provide consistency across environments and multiple deployment targets: physical servers, virtual machines (VMs), and private or public cloud Containers enable customers to simplify multi-tenancy … Continue reading Securing Container workloads for Enterprise

How Tata can regain the telecom market in India


India Telecommunication market has huge potential due to various factors With a subscriber base of nearly 1,210.71 million, as of July 2017, India accounted for the 2nd largest telecom network in the world. With 431.21 million internet subscriber, as of June 2017, India stands 2nd highest in terms of total internet users Mobile based Internet is a key component of Indian Internet usage, with 7 … Continue reading How Tata can regain the telecom market in India

Open Source Hardware – its Cost Reduction for many enterprise business


Large enterprise, cloud service providers, ‘big brand’ product companies are spending millions or billions of dollars in building their data center. So what do you think keeping these companies technology imperatives moving forward. Are they going to focus on hybrid controllers, traffic shaping, 100G, network modeling, network analytics and simulation, circuit automation and testing, backbone and edge traffic engineering, passive and active monitoring, configuration automation … Continue reading Open Source Hardware – its Cost Reduction for many enterprise business

Does Artificial Intelligence (AI) solve shortage of Cyber Security professionals


Worldwide Revenue for Security Technology Forecast to Surpass $100 Billion in 2020, According to the New IDC Worldwide Semiannual Security Spending Guide. The industries that will see the fastest growth in their security investments will be healthcare (10.3% CAGR), followed by telecommunications, utilities, state/local government, and securities and investment services. “The pace and threat of security attacks is increasing every year, especially across compliance-driven industries like … Continue reading Does Artificial Intelligence (AI) solve shortage of Cyber Security professionals