Sekhar Sarukkai

Sekhar Bio

Cybersecurity Data Breaches: Incident Response Planning

June 7, 2016

Incident Response Planning The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a

Read More
Sekhar Bio

Did The FBI Make A Mistake In Publicly Fighting Apple?

April 12, 2016

Apple News – The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one

Read More
Sekhar Bio

A Closer Look at Insider Threats and Sensitive Data

March 30, 2016

Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that  sensitive data in the cloud had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all

Read More
Sekhar Bio

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

January 25, 2016

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many

Read More
Sekhar Bio

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

December 21, 2015

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey

Read More
Shireesh Thota
Here’s How to Position Your Organization for the Era of Data Intensity We live in a data-intensive era. Data is booming. Companies are realizing that data is one of the most important assets and they ...
Cybersecurity Maturity Model Certification (CMMC)
The Rise Of The Corporate VPN Over the past few years, VPNs have become increasingly widely used by the general public. Initially, they were used exclusively by the tech-savvy and privacy obsessed, but as the ...
Ronald van Loon
The Future of Work Technologies like artificial intelligence (AI), machine learning (ML), and automation in all of its forms can augment human workers and enable them to pivot to more valuable work, and perform their ...
Recognizing the Function of UX in Cloud Development
Recognizing the Function of UX Did you know that 50% of global corporate data is stored in the cloud? Little wonder many more businesses are working on moving their web-based applications to the cloud. A ...
Derrek Schutman
Implementing Digital Capabilities Successfully Building robust digital capabilities can deliver huge benefits to Digital Service Providers (DSPs). A recent TMForum survey shows that building digital capabilities (including digitization of customer experience and operations), is the ...