Anthropic’s frontier AI redraws the cyber risk map and forces enterprises to rethink resilience Anthropic’s Mythos AI has ignited a global debate not simply because of...
In today’s digital landscape, law firms, particularly smaller ones, are prime targets for cyber threats despite regulatory safeguards. Implementing CIS Critical Security Controls is crucial...
As a CISO and Head, Cybersecurity, Sudhansu M Nayak specialises and spearheads enterprise cybersecurity (IT/ OT), cloud, and data transformation solutions. He advises CxOs and...
“As new cyber threats emerge daily, the threat landscape changes accordingly. So, it can be difficult for organizations to keep up with the latest threats....
By Sandeep Karan, Head – Information & Cybersecurity Introduction We use a variety of applications to perform daily tasks in our day-to-day lives, both professional...
As cyber attacks are rampant across the world, Varun Vij, Regional Infosec Lead, Serco (Middle East), expresses his views about how to deter the attempts...
By Rick Peters, CISO Operational Technology, Fortinet For years, Operational Technology (OT) systems have been working to control everything from factories to transportation networks to utilities. The reality is...
By: Kazi Nazrul Islam, Cyber Security Architect Remote Desktop Services (RDS), formerly known as Terminal Services, is a service that is used to remotely connect...
By: Kazi Nazrul Islam Cyber Security Architect. A board of directors typically organizes itself into several committees—some standing committees and often some ad hoc committees....
CIO’s and CISOs who lead IT transformations and IT security across the organizations are the key drivers for bringing change across the businesses and they...