Marketing Blockchain Solutions – Jeremy Epstein


Jeremy Epstein (@jer979) is an expert marketer helping companies make sense of solutions built on blockchain technology. In this episode, Jeremy and I discuss and define blockchain and what are some of the most common issues when marketing the idea to new customers. Join is and listen to how inefficiencies in the healthcare, mortgage, insurance and other industries can use blockchain technology to create value … Continue reading Marketing Blockchain Solutions – Jeremy Epstein

Transform your ‘Security Operations Center’


CIOs can take control to secure from the data breaches. Over a decade the cyber security landscape has evolved rapidly and the magnitude of cyber-attacks increased ever before. The future of information security threats will continue to accelerate massively, endangering the integrity and reputation of trusted organisations. This week, the industry experts at Davos WEF 2018 witnessed several cyber security trends and developments including the … Continue reading Transform your ‘Security Operations Center’

Future of Cyber Security with Connected Car Security


The way typical IT organization protects their critical assets with various security technology solutions such as two factor authentication, anti-virus protection, firewalls, intrusion detection systems, DDoS protections and many other technologies. The time has come now to shift the attention to other connected devices that are no more avoidable in everyone’s life Over the past few years, relevant government agencies have also produced reports and … Continue reading Future of Cyber Security with Connected Car Security

Securing Container workloads for Enterprise


What are containers?  Containers represent a transformational change in the way apps are built and run. Containers package an application and all its dependencies into a single image that can be promoted from development, to test, to production, without change. Containers provide consistency across environments and multiple deployment targets: physical servers, virtual machines (VMs), and private or public cloud Containers enable customers to simplify multi-tenancy … Continue reading Securing Container workloads for Enterprise

Startups at India and Israel will benefit by Cyber Security Partnership


Governments and enterprises are committed to the protection and the integrity of their own proprietary information and the privacy of their citizens and customers; while the hackers are motivated to collect data for different reasons. The acts of data protection and privacy protection that these organization take, using authentication, cloud security, critical infrastructure security, endpoint protection, next generation firewalls, security automation and orchestration, encryption, data … Continue reading Startups at India and Israel will benefit by Cyber Security Partnership

India to attract investment USD 100 billion in communication sector


India is the world’s second-largest telecommunications market, with over 1.2 billion subscribers as of September 2017. Availability of affordable smartphones and lower rates are expected to drive growth in the Indian telecom industry. With 70 per cent of the population staying in rural areas, the rural market would be a key growth driver in the coming years. The government of India has introduced Digital India programme under … Continue reading India to attract investment USD 100 billion in communication sector

Does Government Prepared To Deal Cyber Security Threat


Cyberspace is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information and communication technology (ICT) devices and networks. Most of the governments have national cyber security strategies drafted in the recent past, but how far its executed it within the government sectors is still a question to authorities to think thru. NATO Cooperative Cyber Defense Center of … Continue reading Does Government Prepared To Deal Cyber Security Threat