Alibaba Cloud – 11 layer security architecture


A major challenge for organizations is the increasing number of security threats and the rise of their complexity. The inter connectivity of devices over the Internet, both through IoT and mobility, makes it impossible for organizations to monitor and secure all devices. Cyber criminals have also become more sophisticated, with many online tools available for them to execute attacks. The capability gap between organizational security … Continue reading Alibaba Cloud – 11 layer security architecture

The digital world needs an “immune system.”


Chronicle was born in 2016 as a project within X, Alphabet’s moonshot factory. They see a future where enterprise security teams can find and stop cyberattacks before they cause harm. By applying planet-scale computing and analytics to security operations, Chronicle provide the tools teams need to secure their networks and their customers’ data. Stephen Gillett is the CEO​ and Co-Founder​ of Chronicle. Stephen joined Chronicle from Google​, … Continue reading The digital world needs an “immune system.”

Transform your ‘Security Operations Center’


CIOs can take control to secure from the data breaches. Over a decade the cyber security landscape has evolved rapidly and the magnitude of cyber-attacks increased ever before. The future of information security threats will continue to accelerate massively, endangering the integrity and reputation of trusted organisations. This week, the industry experts at Davos WEF 2018 witnessed several cyber security trends and developments including the … Continue reading Transform your ‘Security Operations Center’

Future of Cyber Security with Connected Car Security


The way typical IT organization protects their critical assets with various security technology solutions such as two factor authentication, anti-virus protection, firewalls, intrusion detection systems, DDoS protections and many other technologies. The time has come now to shift the attention to other connected devices that are no more avoidable in everyone’s life Over the past few years, relevant government agencies have also produced reports and … Continue reading Future of Cyber Security with Connected Car Security

Securing Container workloads for Enterprise


What are containers?  Containers represent a transformational change in the way apps are built and run. Containers package an application and all its dependencies into a single image that can be promoted from development, to test, to production, without change. Containers provide consistency across environments and multiple deployment targets: physical servers, virtual machines (VMs), and private or public cloud Containers enable customers to simplify multi-tenancy … Continue reading Securing Container workloads for Enterprise

Future of Work – Increasing cyber risk is challenging traditional employment models


Work is changing. Globalisation, technological progress and Demographic changes are having a profound impact on labour markets, affecting both the quantity and quality of jobs that are available, as well as how and by whom they are carried out. The way we work is changing. As new technologies continue to unfold in the workplace, more than a third of jobs are likely to require skills … Continue reading Future of Work – Increasing cyber risk is challenging traditional employment models

How Tata can regain the telecom market in India


India Telecommunication market has huge potential due to various factors With a subscriber base of nearly 1,210.71 million, as of July 2017, India accounted for the 2nd largest telecom network in the world. With 431.21 million internet subscriber, as of June 2017, India stands 2nd highest in terms of total internet users Mobile based Internet is a key component of Indian Internet usage, with 7 … Continue reading How Tata can regain the telecom market in India