Security

Back to Topic page

Businesses Fail to Encourage Integration of Cyber Security at the Design and Concept Stage: Amit Pradhan, CTSO, Vodafone

Businesses are becoming increasingly sensitive towards recognizing cyber security as one of the top risks for their organizations. In such a situation, the role of a chief information security officer (CISO) assumes center stage as they are faced with an ever growing threat landscape. Particularly, there have been a ...

How Artificial Intelligence and Machine Learning Can Help in Bolstering Defence Against Cyber Attacks

Digital developments bring with them a set of unique challenges. The new-age digital platforms are not free from vulnerabilities, in fact, they sometimes end up increasing them. The attack surface has significantly increased, giving greater leeway to cyber criminals. Cyber threats continue to grow in frequency and sophistication as ...

Does Outsourcing Information Security Make Business Sense?

Think about it like this: Today, there are millions of smartphones, internet users, connected devices, and the number is just increasing by the hour. There is a historic shift in the way digital is becoming a part of our lives – from digital payments, to the way we shop ...

The Threat Vector Has Never Been So Vast: Kalpesh Doshi, CISO, Capgemini

Cybersecurity is no longer a realm of erstwhile information technology (IT), finance or even a chief information officer (CIO) function. Today, it has the attention from senior board members. Organizations have realized the enormous amount of impact that security breach can have on their reputation and their ability to ...

Make Risk a Business Conversation and Not a Technology Issue

Governance, Risk and Compliance (GRC) plays a vital role in any organization's approach towards business, operational, third party or technology risk management. In this age of digital transformation, it is even more critical as businesses go perimeterless. A couple of months ago I had an opportunity to speak to Sam ...

Companies will Invest in Studying Users’ Activities and Behaviour for Better Security Posture: NPCI CISO

Human factors in cybersecurity is of utmost importance. Risky cybersecurity behaviours, attitudes towards cybersecurity in a business environment, and not paying attention towards these elements result into serious lapses.  Mathan Babu Kasilingam, CISO, National Payments Corporation of India (NPCI), in conversation with Shipra Malhotra of dynamicCISO lists down his top priorities ...

Cos Need to Embed Cyber Security into Their Products and services, Supply Chains and Partnerships: CISO, Indiabulls

Rohit Kachroo, CISO, Indiabulls Group, in conversation with dynamicCIO gives an insight into what is it that’s keeping the CISOs awake at night and how they need to transform themselves to stay relevant in today’s dynamically evolving threat landscape. Q. What is your vision as a CISO? In general, ...

Identifying Business Context Around Security Incidents is Key to Solve Big Problems: Zulfikar Ramzan, RSA

Is Cybersecurity a technology issue or a business issue? How are Boards reacting to the massive data breaches that are demolishing corporates both financially and reputation-wise? What should a CISO do to manage the deluge of data and devices, half of which are not even visible to him? What’s ...

Vendors Betting Big on Machine Learning in Cybersecurity: Can it Deliver?

Amazon Web Services recently launched its security service called Macie which uses machine learning to automate the process of identifying, classifying and protecting data in AWs. It uses the context of the information to understand what’s sensitive and how. Thus, it recognizes sensitive data such as personally identifiable information ...

Cos Have to Reward and Incentivize Risk Management to Build a Risk Culture

David Walter, Vice President, RSA Archer, RSA in conversation with dynamicCIO decodes risk management.   Q. Considering the digital transformation that organizations are undergoing and adoption of new age digital technologies, what are some of the pertinent risks organizations need to own up?   There are three different risk ...

Is Artificial Intelligence the Future of Cyber Security?

Microsoft on its Blog, a couple of days ago, announced to launch a cloud service that uses Artificial Intelligence to track down bugs in software. The company will soon start offering a preview version of the tool for Linux users as well.                               Microsoft Security Risk Detection, previously known as Project ...

Three Lines of Defense Against Ransomware Attacks by Cybercriminals

Criminals go where the money is, and cybercriminals are no exception.   And right now, the money is in ransomware.   It's a simple scam. Encrypt the victim's hard drive, then extract a fee to decrypt it. The scammers can't charge too much, because they want the victim to ...

Lost Passwords Can Be Changed, But Lost Biometric Identity?

Everyone hates passwords but uses them as a necessity to protect corporate digital assets, personal information, and financial assets. Complexity level has increased with time and so has the ability to crack them. This resulted in multi-factor authentication with various means, the most popular being OTP (One Time Password) ...

Cloud Storage Providers Will Overtake FSI Companies as the Prime Targets of Phishing Attacks in 2017

Yesterday while delivering his keynote at RSA Conference 2017, Brad Smith, President and Chief of Legal Microsoft very aptly pointed towards a very typical syndrome we all humans suffer from: Inquisitiveness. "90% of intrusions begin with a phishing email and every company has at least one employee who will click ...

Lethal Threats: Will Our Cyber Defence be Any Match?

Not many years ago who could imagine there will be something known as drone – a flying object that could be used to deliver pizzas and packets, flying over weddings venues capturing astonishing visuals, and at the same time also do reconnaissance of a very different kind for keeping ...