“In law, a man is guilty when he violets the rights of others. In ethics, he is guilty if he only thinks of doing so.” Immanuel Kant In last few years, specifically after the economic crash down, there are plenty of stories that highlight the pitfalls on road of business success and the people in power abuse power to well.…
Author: Sujata
Risk Management Using Artificial Intelligence
When we go through the pages of history, we can easily make out, the economic activities have a substantial risk, and management of these risks is essentially safeguarding the impact on the society and human life. In this era of digitization, businesses have relied more and more on the digital information. Protecting digital information from the risk of compromise, accidental…
Top 10 Skills Every CISO Must Have
Digitization of business, the involvement of disruptive technologies to perform business functions, dissolving the boundaries between usage of personal devices to business work and evolution of technologies like Artificial Intelligence (AI), Machine Learning and Deep Learning are increasing the attack vectors. The targeted attacks using the technological innovation has increased. The recent ransomware attacks have proven capability to cripple the…
How Can Small Businesses Protect Themselves From Cyber Attack?
Small businesses are the backbone of any nation’s economy. Historically big enterprises depended on small businesses for producing spare parts, performing jobs to keep the cost low of their products. In the era of digitization big organizations, except for their core business elements, outsources almost all jobs to Small and Medium-sized Enterprise (SME). This includes accounting, marketing, financial management, credit collection,…
A Day in CISO’s Life
My profession gives me the chance of meeting and having deep discussions with CISO. Being in the profession for long enough to have CISO’s in my list of personal friends, I get to know the both sides of the coin, professional and personal. The job of CISO is demanding and challenging. Change is the only constant thing in CISO’s day.…
How Vulnerable are Oil and Gas Industries from Cyber Attacks
The word “Digital transformation” has become part of our everyday life, cashless transactions to the touchless automation; industries are transforming rapidly. Oil and gas industry which has played a pivotal role in the economic transformation of the world by providing, fueling the needs of mobility, light, and heat of world’s population is as well going through the digital transformation. Following…
Getting Smart and Safe With Security Awareness
There is hardly a day when we do not read or get to know about cyber-attack, cyber- crime, security breach, zero day attack or identification of a new vulnerability. We have seen every year the security budget and spend on the security is increasing and still, organizations are getting breached. Most this money goes to implement and manage technologies and…
Google Cloud Platform (GCP) Security
Most of the organizations are either started using cloud services or migrating to the cloud. First and the most important decision-making point before migrating the applications to the cloud is, how this transformation will impact the data security and compliance to the applicable regulatory requirements to my business? Most of the prominent cloud service providers like Google (GCP), Amazon (AWS)…