Healing cyber wounds in global healthcare
By Morgan Wright, Chief Security Advisor, SentinelOne
The recent ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group, has highlighted critical vulnerabilities within the...
Importance of security-by-design for IT and OT systems in building a security resilient framework
By Pritam Shah, Global Practice Head - OT Security and Data Security
Traditionally, Information Technology (IT) systems—including computer storage and networking devices—and Operational Technology (OT)...
Harnessing the power of DevOps for seamless software delivery
By Anand JK Jain, Vice President - Solutions Engineering, MSys Technologies
DevOps can transform software development by enabling collaboration, automation, and integration across teams and...
Shift left security – Security by design in DevOps
By Brijesh Balakrishnan, Vice President & Global Head of Cybersecurity Practice, Infosys
As part of accelerated digital transformation and the recent evolution of technologies, enterprises...
Dell and Red Hat transform AI complexity into opportunity
By Caitlin Gordon - Vice President, Product Management, Dell Technologies
In the rapidly evolving landscape of artificial intelligence (AI), seizing opportunities amidst complexity is paramount....
Evolving Cybersecurity Practices Through AI’s Large Language Models
By Gregor Stewart, Vice President of Artificial Intelligence at SentinelOne
The tech world has been abuzz surrounding AI for well over a year. Yet, beyond...
The XZ-Utils backdoor is a reminder of why we need supply chain security
Attributed by Nathan Wenzler, chief cybersecurity strategist, Tenable
The XZ-Utils backdoor is one of the most well-executed supply chain attacks sharing a podium spot with...
5 reasons non-profits are a target (and what they need to know about cybersecurity)
By Lisa Campbell, Vice President SMB, CrowdStrike
Small and medium-sized businesses (SMBs) are a more frequent target of cybercrime than large companies, and small non-profits...
Cohesity brings Intel’s confidential computing capabilities to Cohesity Data Cloud
Cohesity announced it is collaborating with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud. Leveraged with Fort Knox, Cohesity’s industry-leading...
Mastering HTTP DDoS attack defence: Innovative strategies for web protection
By Jaspal Sharma, Technical Director - India & Middle East, Radware
Understanding HTTP DDoS Attacks
An HTTP DDoS attack is a type of denial-of-service attack where...