“As new cyber threats emerge daily, the threat landscape changes accordingly. So, it can be difficult for organizations to keep up with the latest threats....
By Sandeep Karan, Head – Information & Cybersecurity Introduction We use a variety of applications to perform daily tasks in our day-to-day lives, both professional...
As cyber attacks are rampant across the world, Varun Vij, Regional Infosec Lead, Serco (Middle East), expresses his views about how to deter the attempts...
By Rick Peters, CISO Operational Technology, Fortinet For years, Operational Technology (OT) systems have been working to control everything from factories to transportation networks to utilities. The reality is...
By: Kazi Nazrul Islam, Cyber Security Architect Remote Desktop Services (RDS), formerly known as Terminal Services, is a service that is used to remotely connect...
By: Kazi Nazrul Islam Cyber Security Architect. A board of directors typically organizes itself into several committees—some standing committees and often some ad hoc committees....
CIO’s and CISOs who lead IT transformations and IT security across the organizations are the key drivers for bringing change across the businesses and they...
Md. Abul Kalam Azad, Head of IT Security & Compliance, Eastern BankLimited, Bangladesh In this 21st century we are facing several technology challenges. Some of...
Adarsh Nair, Head of Information Security, UST Global Inc Website: https://adarshnair.com In the event of the COVID-19 outbreak and the subsequent lockdown situations, the utilization...
A larger workforce across the globe has moved to their homes for meeting the business continuity requirements in this pandemic situation of COVID-19. The migration...