The invisible layer: Cyber resilience as the backbone of travel infrastructure Express Computer Dec 5, 2025 By Suraj Tiwari, Chief Information Security Officer, VFS Global Conversations around the Digital Personal Data Protection…
India’s AI security at a crossroad: Why 2025 marks the turning point for autonomous cyber defense Express Computer Dec 5, 2025 India’s digital economy has reached a defining moment. As enterprises fast-track cloud modernization, embrace AI-driven…
Modernising Enterprise Security for an Application-Centric World Express Computer Nov 7, 2024 By: Mani Sundaram, Executive Vice President, Security Technology Group, Akamai Technologies Over the past 20 years,…
Cybersecurity Trends and Predictions for 2023 Express Computer Jan 10, 2023 By Saket Verma, Cybersecurity Practice Leader, Kyndryl India
Emerging technologies and measures for enterprise security Express Computer Dec 6, 2022 Businesses today need to be more vigilant around data and users and have robust processes in place in the event of a breach or a…
Is Endpoint Security taking a backseat in your IT architecture? Express Computer Nov 26, 2022 Technology has never ceased to astound us, nor has the evolving threat landscape
How SASE can transform security, making it future proof Express Computer Sep 3, 2020 Adopting SASE principles offers a unique opportunity to simplify IT security again
Deloitte recommends 5 step security approach to protect the Indian enterprise Express Computer Jul 4, 2020 With Work from Home (WFH) becoming the ‘new normal’ amidst COVID-19 crisis and cyber attackers and virus lurking in the shadows,…
Panel Discussion on Enterprise Security: How to proactively protect your company in the digital era… Express Computer Feb 10, 2020 BFSI Technology Conclave ~ Driving Innovation Delivering Experiences | 24-25 January 2020, Novotel Pune
Modern encryption to be vulnerable to a powerful Quantum computer Abhishek Raval Dec 12, 2019 Modern encryption, key management and digital signatures are based on two asymmetric cryptographic algorithms: RSA and ECC. Both…