Member’s Login

Forgot Password  |  Create an account

Machine Learning Can Help Free Up L1 Resources to Focus on Strategic Tasks: Shivkumar Pandey, CISO, BSE

Posted By - Shipra Malhotra, Executive Editor

Shivkumar Pandey, CISO, BSE in a free wheeling chat with Shipra Malhotra, Executive Editor, dynamicCISO takes up a range of issues, ranging from cybersecurity positioning in the board and importance of new age cognitive technologies in the information security domain to what are the cybersecurity threats that keep him awake at night.

Related Tags - Infosec, Security, Information Security, Cybersecurity, Artificial Intelligence, AI, Machine Learning, ML, Malware, Zero Day Attack, CISO Role, DDOS, Insider Threat, CISO and Board, CISO in the Board, BSE, Shivkumar Pandey

Mitigating Security Risks Associated with Internet of Things (IoT)

Posted By - Muqbil Ahmar, Executive Editor

According to IHS Markit, the number of connected Internet of Things (IoT) devices worldwide will jump 12 per cent on average annually, from around 27 billion in 2017 to 125 billion in 2030. Such is the extent of this digital revolution.

Related Tags - IoT, Security, Risks, CISO, Cybersecurity

RSA Identity Governance and Lifecycle Introduces Advanced Analytics Capabilities to Help Organisations Mitigate User Access Risks

Posted By - DynamicCISO,

RSA has unveiled a new risk-based access review user experience, implementation service offerings and recommended practices for RSA Identity Governance and Lifecycle that simplify day-to-day governance while helping to reduce overall identity risks for customers.

Related Tags - RSA Security, Identity Risk, GDPR, RSA Identity Governance and Lifecycle, Analytics, User Access

Record Surge in Health Care Attacks, Fileless Malware, Cryptocurrency Mining: McAfee Report

Posted By - DynamicCISO,

McAfee Labs saw on average eight new threat samples per second, and the increasing use of fileless malware attacks leveraging Microsoft PowerShell. The Q4 spike in Bitcoin value prompted cybercriminals to focus on cryptocurrency hijacking through a variety of methods.

Related Tags - Ransomware, Education, Finance, Bitcoin, Malware, Healthcare, Cyberattacks, Fileless Malware, Crypro currency,
- View All Article -

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All