Advertisement

Healing cyber wounds in global healthcare

By Morgan Wright, Chief Security Advisor, SentinelOne The recent ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group, has highlighted critical vulnerabilities within the...

Importance of security-by-design for IT and OT systems in building a security resilient framework

By Pritam Shah, Global Practice Head - OT Security and Data Security Traditionally, Information Technology (IT) systems—including computer storage and networking devices—and Operational Technology (OT)...

Harnessing the power of DevOps for seamless software delivery

By Anand JK Jain, Vice President - Solutions Engineering, MSys Technologies DevOps can transform software development by enabling collaboration, automation, and integration across teams and...

Shift left security – Security by design in DevOps

By Brijesh Balakrishnan, Vice President & Global Head of Cybersecurity Practice, Infosys As part of accelerated digital transformation and the recent evolution of technologies, enterprises...

Dell and Red Hat transform AI complexity into opportunity

By Caitlin Gordon - Vice President, Product Management, Dell Technologies In the rapidly evolving landscape of artificial intelligence (AI), seizing opportunities amidst complexity is paramount....

Evolving Cybersecurity Practices Through AI’s Large Language Models

By Gregor Stewart, Vice President of Artificial Intelligence at SentinelOne The tech world has been abuzz surrounding AI for well over a year. Yet, beyond...

The XZ-Utils backdoor is a reminder of why we need supply chain security

Attributed by Nathan Wenzler, chief cybersecurity strategist, Tenable The XZ-Utils backdoor is one of the most well-executed supply chain attacks sharing a podium spot with...

5 reasons non-profits are a target (and what they need to know about cybersecurity)

By Lisa Campbell, Vice President SMB, CrowdStrike Small and medium-sized businesses (SMBs) are a more frequent target of cybercrime than large companies, and small non-profits...

Cohesity brings Intel’s confidential computing capabilities to Cohesity Data Cloud

Cohesity announced it is collaborating with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud. Leveraged with Fort Knox, Cohesity’s industry-leading...

Mastering HTTP DDoS attack defence: Innovative strategies for web protection

By Jaspal Sharma, Technical Director - India & Middle East, Radware Understanding HTTP DDoS Attacks An HTTP DDoS attack is a type of denial-of-service attack where...
- Advertisement -

Follow Us

6,217FansLike
240FollowersFollow
488FollowersFollow
101SubscribersSubscribe

Latest article

1 in 4 Indian organisations has fully digitised its physical documentation, demonstrating a strong...

Iron Mountain, has released its latest AI Readiness report, based on a comprehensive survey conducted in partnership with Vanson Bourne. The study engaged 1,400...

KOGO unveils World’s 1st AI Agent Store, empowers businesses to adopt AI with the...

With 100’s of AI Agents, Tools & Plugins, the KOGO AI Store invites developers, SME and large system integrators to build, deploy and manage their own agents with no code as the company aims to make this the largest AI store in 2025.

InfoVision Launches Advanced Media Analytics Platform AlphaMetricx: a Unique Blend of AI, Machine Learning,...

InfoVision Inc. announced the launch of AlphaMetricx – an AI-powered media analytics platform for media analyst teams and corporate communicators. AlphaMetricx (AMX) leverages AI...
- Advertisement -