CYBERSECURITY

Join the community of 2M+ industry professionals

Subscribe to our Daily Newsletter

By continuing you agree to our Privacy Policy & Terms & Conditions

Scan to download App

Download ETCISO App for Realtime updates of content you follow

  • Seamless reading experience
  • Save your favourite articles
Advertisement

More in CYBERSECURITY

  • Essentials for a preemptive cybersecurity posture

    Highlighting the complexity of the present-day threat landscape, Vinay Bhide, Associate Vice President at Tata Communications Ltd., reveals that it takes an average of 277 days to identify and contain a data breach.

    essentials for a preemptive cybersecurity posture
  • All about the ‘mercenary spyware’ Apple has warned about

    Apple highlighted that individuals are targeted based on their identities or professions, with state-sponsored attackers dedicating significant resources to compromising a small number of devices, heightening the difficulty of detection and prevention.

    all about the mercenary spyware apple has warned about
  • India Inc on the move 2024: Building resilient future-proof cybersecurity model

    As India Inc. strides forward into 2024, experts weigh in on the imperative to build a resilient, future-proof cybersecurity model to safeguard against the increasingly sophisticated digital threats. This initiative is not just about defending against current threats but also about neutralizing potential future vulnerabilities.

    india inc on the move 2024 building resilient future proof cybersecurity model
  • Experts weigh in on biggest threats to identity security

    In the context of modern cybersecurity practices, especially with the shift towards cloud-based architectures, the Trilogue Chat on protecting identities, privileges, and secrets underscores the crucial elements of managing access and safeguarding sensitive information.

    experts weigh in on biggest threats to identity security
  • Divide between business teams and security teams is getting worse: Ankit Wasnik, Qualys Inc

    The Cyber Vigilance Index, as introduced by Ankit Wasnik, Security Solutions Architect at Qualys Inc., represents a novel approach to managing business risk in the digital age. This concept aims to bridge the communication and understanding gap between business teams and security teams, a divide that often hampers effective cybersecurity measures within organizations.

    divide between business teams and security teams is getting worse ankit wasnik qualys inc
  • Abuse of power by tech leadership: Hitesh Mulani, Group CISO, Mahindra Group

    Hitesh Mulani, Group CISO of Mahindra Group, shines a light on the darker aspects of the technology industry that often go unnoticed or unspoken. When leaders in technology positions engage in unethical practices, such as taking bribes or engaging in other forms of corruption, it not only compromises the integrity of their organizations but also tarnishes the reputation of the tech community as a whole.

    abuse of power by tech leadership hitesh mulani group ciso mahindra group
  • Opportunities and challenges for government CISOs: Neha Jain, UPDESCO State CISO

    When addressing the "people" aspect of cybersecurity, especially within the context of government organizations as highlighted by Neha Jain, Special Secretary, IT and Electronics Department, Government of UP and MD, UPDESCO State CISO, Uttar Pradesh, it becomes crucial to focus on both the opportunities and challenges faced by government CISOs.

    opportunities and challenges for government cisos neha jain updesco state ciso
Advertisement