In this highly connected world, it is unlikely that you would get a second chance to right the wrongs, says Gomeet Pant, Lead-IT Security and Compliance, Cairn India.
On Sunday, Winter Olympics’ officials confirmed that their servers were hit by a cyber attack during the opening ceremony on Friday at Pyeongchang, South Korea.
A malicious version of the widely used tool Browsealoud managed to infect more than 4,000 websites to mine digital currency, Monero for over four hours.
FM Arun Jaitley may have announced substantial allocations to new technologies but without a proper cybersecurity framework, IT leaders wonder where it will lead.
After figuring out how to network devices together and how to analyse the data streaming from them, the industry now has to focus upon how to use these two to form definite business engagements to derive profitable outcomes.
With issues of data residency and reluctance to move away from legacy resolved, the question now arises if the average Indian CIO has enough faith in cloud service providers to store and manage critical business data seamlessly.
To understand and tackle issues of cybersecurity, enterprises must first decode the intersection of users, data and network, says George Chang, Head–APAC, Forcepoint.
With most organizations adopting mobile and implementing BYOD policies, how will the entry of the device and free WiFi-loving millennial employee affect security of critical data?