Sekhar Sarukkai

Cybersecurity Data Breaches: Incident Response Planning

By Sekhar Sarukkai | June 7, 2016

Incident Response Planning The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a

Did The FBI Make A Mistake In Publicly Fighting Apple?

By Sekhar Sarukkai | April 12, 2016

Apple News – The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one

A Closer Look at Insider Threats and Sensitive Data in the Cloud

By Sekhar Sarukkai | March 30, 2016

Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that  sensitive data in the cloud had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

By Sekhar Sarukkai | January 25, 2016

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

By Sekhar Sarukkai | December 21, 2015

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey

THOUGHT LEADERSHIP ARCHIVE

The Economics, Concepts and Fundamentals of Cloud Computing

By Gopan Joshi

Fundamentals of Cloud Computing Addressing security concerns of the Public Cloud Enthusiasm for cloud computing has as much to do with economics as technology. Growth in the number of applications and the volume of data that must be managed have

Apcela

Industrial IoT will reshape network requirements

By Mark Casey

Industrial IoT The hype around IoT may have been surpassed this year by breathless coverage of topics such as artificial intelligence and cryptocurrencies, but there continue to be interesting developments in IoT related technology and services. The possibilities for efficiency

Living In A Post-Safe Harbor World: What Your Company Needs To Know

By Ron Hovsepian

Living In A Post-Safe Harbor World With the striking down of the Safe Harbor agreement in October, we have seen the tip of a data privacy iceberg whose global implications will play out well into the new year. In 2016,

Advances in Technology and Consumer Behaviour are Driving Transformation

By Francesco Venturini

Technology and Consumer Behaviour Advances in technology and consumer behaviour are driving a transformation in the way video content is delivered to consumers. The change involves a migration away from traditional broadcasting models and platforms towards digital distribution over the

Do Not Rely On Passwords To Protect Your Online Information

By John Barco

Do Not Rely On Passwords Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience

GDPR Compliance

A Quick and Dirty Guide to GDPR Compliance

By Brad Thies

GDPR Compliance Set a reminder: On May 25, 2018, the new General Data Protection Regulation directive from the European Union will go into effect. Although its goal to protect consumer data is admirable, about a third of global companies don’t know whether

Public Clouds Have Internal IT Beat For New Projects

By CloudTweaks

Renting IT Resources For departments in organizations that need to get an application deployed, the fastest and most effective option is renting IT resources on a public cloud such as Amazon Web Services (AWS), rather than working with the internal

The Great Arms Race For Security: Virtualization

By Gavin Hill

The Great Arms Race For Security Since its infancy in the early seventies when the first computer virus was created, the malware and anti-malware business has grown into multi-billion dollar industries. No longer are script kiddies creating malware for notoriety,

CIOs Can Tackle Cloud Fears 

5 Ways CIOs Can Tackle Cloud Fears

By Robert Grazioli

CIO Cloud Fears  CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud?  The truth is

Demand For Cloud Skills Increases Around The World

By CloudTweaks

Demand for Cloud Skills Increases Thinking about adding more cloud skills to your repertoire? Stop thinking. The time to do it is now. For IT professionals, cloud computing skills are becoming an essential resume item. Companies are actively – and

How Will Artificial Intelligence Really Impact Jobs?

How Will Artificial Intelligence Really Impact Jobs?

Artificial Intelligence Jobs Hamilton is my favorite Broadway musical. The show follows the life of one of America’s founding fathers, ...
The Innovation of Automation Has Fueled the Fear of Machines Stealing Jobs

The Innovation of Automation Has Fueled the Fear of Machines Stealing Jobs

Automation and Job Creation What happens when humankind makes a machine more intuitive and efficient than itself? A wake of ...
cloud computing certification

Why Certification Matters for Cloud Service Providers

Certification for Cloud Service Providers As of 2017, the concept of “cloud” has become more of a norm for companies ...
ISC 2 - CCSP

Cybersecurity Skills Shortage Takes Center Stage at (ISC)2 Security Congress

Industry Leaders Discuss Workforce Strategy CLEARWATER, Fla., Aug. 10, 2017 /PRNewswire-USNewswire/ -- (ISC)²® today announced Gary Beach, author of The U.S. Technology Skills Gap, will ...
New Report Reveals Just How Bad The Cybersecurity Skills Gap Is

New Report Reveals Just How Bad The Cybersecurity Skills Gap Is

The Cybersecurity Skills Gap It’s not difficult to find worrying predictions from experts who say the cybersecurity sector desperately needs ...