• 3 years ago

Attacks are becoming more and more sophisticated

Radhesh Walwadkar, Manager - Systems Engineering (Enhanced Tech) for India & SAARC- Fortinet &nb...

  • 3 years ago

A zero-trust approach can insulate businesses from impact of a data breach

Lata Singh, Director- Regional Technology Sales Leader- India & South Asia-IBM India  ...

  • 3 years ago

Security is one of the most integral and intrinsic part of VMware’s products

Vinay Bhat, Director - Networking and Security, VMware India   “Security is not som...

  • 3 years ago

Only a logical systemic system can prevent fraud

Major General Dilawar Singh, Ex-Indian Army    “Each one of us is affected by...

  • 3 years ago

Cyber security has become critical of our existence

Sanjay Sahay Ex IPS, Founder & Director- TechConPro   “The digital transformati...

  • 3 years ago

As the human race has progressed, so has the risk

Dr. Praveen Kumar Khosla, Executive Director, C DAC   "The COVID 19 pandemic ha...

  • 3 years ago

Experts should prioritize cyber in cyber decisions

Lt. Gen. Dr. S.P. Kochhar D.G., COAI    “Industries are in the process of dig...

  • 3 years ago

There has been jump in cybercrimes especially adversely targeting enterprises

Prof. Triveni Singh    S.P- Cyber Crime- U.P. Police     “There has...

  • 3 years ago

Detecting suspicious behaviors on endpoint

Suhas Kashyap  Sr. Technical Architect, Cyber Security, Ingram Micro     ...

  • 3 years ago

Fraudsters are sending scripts through phishing links or email bombing

Himanshu Rastogi  Consultant - Cybersecurity Services, Ingram Micro     &...

  • 3 years ago

The series of professional services begin with assessment

Santanu Bhaumik    Head, Professional Services, Ingram Micro      ...

  • 3 years ago

Log4j- an unauthenticated remote code execution

Sandip Kumar Panda, Founder & CEO - Instasafe    “The digital transformati...