Cybersecurity firm Darktrace accepts $5 bn takeover
Darktrace chief executive Poppy Gustafsson said the group's "technology has never been more relevant in a world increasingly threatened by AI-powered cyberattacks".
Darktrace chief executive Poppy Gustafsson said the group's "technology has never been more relevant in a world increasingly threatened by AI-powered cyberattacks".
In the constantly evolving world, where the risks are high, the majority of businesses are adopting a zero-trust strategy. More than half of the large organisations have implemented zero-trust architecture to prevent data breaches.
The PAM strategy comprises people, processes, and technology and is implemented by organizations to safeguard against the threat posed by credential theft and privilege misuse.
In a blog post published on Wednesday, the company said its Adaptive Security Appliances - pieces of equipment that roll several different digital defense functions into one - had previously unknown vulnerabilities that had been exploited by a group of hackers they called "UAT4356."
Shrimali assumes dual roles as Chief Information Security Officer and Data Protection Officer at Tata Steel Ltd. and will lead Tata Steel's information security strategies, implementing robust measures, conducting risk assessments, and ensuring compliance with data protection laws.
Highlighting the complexity of the present-day threat landscape, Vinay Bhide, Associate Vice President at Tata Communications Ltd., reveals that it takes an average of 277 days to identify and contain a data breach.
Apple highlighted that individuals are targeted based on their identities or professions, with state-sponsored attackers dedicating significant resources to compromising a small number of devices, heightening the difficulty of detection and prevention.
Durga Prasad Dube, EVP & CISO at Reliance Industries Ltd, brings to light the existential dimension of Chief Information Security Officers (CISOs), highlighting the evolving role and the profound responsibilities that come with the position in the modern digital landscape.
The concept of acing application security by converging security controls revolves around integrating various security measures and protocols directly into the application development lifecycle, rather than treating them as afterthoughts or separate layers.
As India Inc. strides forward into 2024, experts weigh in on the imperative to build a resilient, future-proof cybersecurity model to safeguard against the increasingly sophisticated digital threats. This initiative is not just about defending against current threats but also about neutralizing potential future vulnerabilities.
Vipin Samar, SVP of Database Security at Oracle, notes that India is experiencing exponential growth every month, whether in the number of transactions or the volume of customers. This kind of growth was previously observed in China and is now occurring in India, he says.