In a recent interaction with CIO&Leader, Sharda Tickoo, Country Manager for India & SAARC at Trend Micro, shared her insights into the evolving cybersecurity landscape. […]
The AI Cybersecurity Race: How CISOs Are Defending Against Next-Gen Threats
In the rapidly evolving landscape of cybersecurity, the battlefield is no longer restricted between security experts and threat actors, it is extending to include AI-driven […]
Winds of Change – Infrastructure management returns to center stage
The Oxford Dictionary mentions epoch-making events as those of major importance and which are likely to have a significant impact over a period of time. […]
New AI deployments should be done in controlled environment
In a conversation with CIO&Leader, Vamsi Krishna Ithamraj, CTO of Access Mutual Fund, shares his expertise on the current and future roles of AI and […]
Should CISOs be the Data Protection Officers?
Whether you are the DPO or not, you will have to play a big role as the CISO to ensure that your organization is compliant […]
Are Human necessary to Cyber Threat Intelligence?
Given the increasing financial and reputational costs of breaches, an organization can no longer overlook human aspect of Cyber Intelligence The customary approach to organizational […]
Information Protection is Raison D’etra of Every Business
Trust is the cornerstone of every business and it is what businesses thrive on. Securing that trust is not an option but a business obligation—our […]
AI & its Implications on Information Security
The implications of artificial intelligence (AI) on information security include the potential risks posed by AI-driven cyber threats and the ways AI can be used […]
Cyberattack at one of the oldest Indian co-op banks, crores stolen?
Information of thousands of debit cards is also suspected to be stolen by cybercriminals in the malware attack Cosmos Bank, one of the oldest Indian […]
Application Security from a Data Protection Compliance Perspective
In a little over a decade, the World Wide Web has evolved from purely static information repositories into highly functional applications that process sensitive data […]