Sekhar Sarukkai

Data Breaches: Incident Response Planning – Part 2

By Sekhar Sarukkai | June 8, 2016

Incident Response Planning – Part 2 Continued from Part 1… As an estimated 50 million consumers were yet to be informed more than a month after the breach discovery, a Senate health committee had to intervene. But that wasn’t the

Data Breaches: Incident Response Planning – Part 1

By Sekhar Sarukkai | June 7, 2016

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another

Did The FBI Make A Mistake In Publicly Fighting Apple?

By Sekhar Sarukkai | April 12, 2016

Dropping The Gloves: The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one

A Closer Look at Insider Threats and Sensitive Data in the Cloud

By Sekhar Sarukkai | March 30, 2016

Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that  sensitive data in the cloud had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

By Sekhar Sarukkai | January 25, 2016

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

By Sekhar Sarukkai | December 21, 2015

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey

POPULAR

Cloud’s Mighty Role - Why Custom Development is the Next Big Thing (Again)

Cloud’s Mighty Role – Why Custom Development is the Next Big Thing (Again)

Custom Development is the Next Big Thing Today, software is playing a very important role in performing basic business processes ...
Direct Connect To Cloud: Solving For Performance, But At What Cost?

Direct Connect To Cloud: Solving For Performance, But At What Cost?

Direct Cloud Connect Executives embarking on the journey to becoming a digital enterprise are essentially asking IT to enable the ...
How IoT and Travel Go Hand-in-Hand

How IoT and Travel Go Hand-in-Hand

IoT and Travel  There is no question that the Internet of Things, or IoT, is here to stay. Just this ...
Fintech Dark Web

An End to Credit Cards? How the Dark Web Is Pushing Fintech Towards Blockchain

Dark Web Pushing Fintech Towards Blockchain As Jennifer Klosterman points out, “There are many strong reasons for reputable businesses to ...
Multi or Hybrid Cloud, What’s the Difference?

Multi or Hybrid Cloud, What’s the Difference?

Multi Cloud You’ve likely heard about the latest trend in cloud computing commonly referred to as multi-cloud, and it is ...
How Big Data Is Aiding Police And Security Officers

How Big Data Is Aiding Police And Security Officers

Big Data Is Aiding Police Officers Big data has become a trusted resource for people in industries ranging from health ...
5 Ways Cloud-based Tools Can Help Accountants Escape The IT Treadmill

5 Ways Cloud-based Tools Can Help Accountants Escape The IT Treadmill

Accountant Cloud Tools Digital tools and software have become an inseparable part of any accountant's profession. There are software for ...
State of the Cloud Report In 2017

State of the Cloud Report In 2017

Cloud Report 2017 As the definitive guide to the biggest trends in the cloud industry, this year’s “State of the ...