Skip to main content
Home

Main menu

  • News
  • Security Agenda
  • CSO100
  • Threats
  • Compliance
  • Breaches
  • Videos
  • tw
  • fb
  • rss

Quick links:

  • CISO Speaks
  • CISO Movements
  • Latest Hacks
  • Malware
  • Vulnerabilities
  • Patches & Updates
  • Advisory Board

Sections:

  • News
  • Security Agenda
  • CSO100
  • Threats
  • Compliance
  • Breaches
  • Videos
  • tw
  • fb
  • rss

Breadcrumb

  1. Home
  2. Compliance

Compliance in Cloud

Cloud workloads at risk as security, management and compliance fail: Report
Cloud migrations motivate boards on security more than compliance or fear of attack
How to ensure General Data Protection Regulation compliance in the cloud
Cracks in the cloud: CISOs struggle to ensure cloud compliance

Threats: GDPR

Four API trends in a GDPR world
IT leaders ready to embrace GDPR regulation; compliance challenges remain
GDPR: 6 checkpoints to navigate compliance complexity
How Microsoft EMS can support you in your journey to EU GDPR compliance – part 4

Compliance: What OEMs are doing

India’s NEW Personal Data Protection Law is almost here. Are you ready?
Using data governance and compliance to your advantage

SECURITY AGENDA

Security and business are intertwined: Prasad Mandava, Akamai India
Indian enterprises are highly exposed to advanced cyber threats: Bhaskar Bakthavatsalu, Check Point
Adopt a ‘trust, but verify’ approach for a zero trust security environment: Edgar Dias, F5 Networks
Enterprises should invest in people and build cyber threat-hunting practices: Shrikant Shitole, FireEye
Critical enterprise and govt data will be the new oil: Surendra Singh, Forcepoint
Automated threat intelligence is a valuable tool against attack vectors: Rajesh Maurya, Fortinet
A cognitive SOC can help determine threats which are applicable to you: Vaidyanathan Iyer, IBM India/South Asia
AI, AR and blockchain are disrupting the cybersecurity landscape: Shrenik Bhayani, Kaspersky Labs
Next big wave of innovation in cybersecurity solution is ML and AI: Venkat Krishnapur, McAfee India
Big data analytics, AI and blockchain can help reclaim surrendered ground: Anil Bhasin, Palo Alto Networks 
Businesses must focus on digital risk management : Rajnish Gupta, RSA
CISOs must shape IT security programs around overall corporate strategy: Gaurav Agarwal, Symantec
CSOs must develop a training program focused on advanced threats: Nilesh Jain, Trend Micro

Security Trends for 2019

State of Cybersecurity

A simple app penetration test could have prevented the 7-Eleven data breach, say experts
McAfee in talks for US$1B public market return
Cisco sounds warning on 3 critical security patches for DNA Center
Latest cyberattack from the TrickBot malware family identified: Research

Hacked

Executive Interviews

You can't take a zero-trust view with traditional hub-and-spoke architecture: Scott Robertson, Zscaler
Vulnerability management, surface visibility is imperative for modern CSOs: Gerry Sillars
Spear phishing has come a long way since the ‘Nigerian prince’ racket: Hatem Naguib, Barracuda
Bring your own key to resolve trust issues: Jin MA, Alibaba Cloud

Footer

  • About Cso
  • ADVERTISING
  • PRIVACY POLICY
  • Contact Us
  • tw
  • fb
  • rss
X

idg

Copyright © 2005-2019 IDG Media Private Ltd. All rights reserved

Reproduction in whole or part in any form or medium without express written permission of IDG Media Pvt. Ltd is prohibited.

the idg network

  • THE IDG NETWORK:
  • Cio.in
  • ComputerWorld.in
  • Channelworld.in