Vibhav Agarwal

Vibhav

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

May 29, 2017

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, and other organizations across more than 150 countries. The ransomware encrypted user data, and demanded a payment in bitcoins to

Read More
Vibhav

Principles of an Effective Cybersecurity Strategy

April 18, 2017

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a rapid increase in the number of internet connected devices, an increased dependency on third party

Read More
Vibhav Agarwal

5 Recommendations for Effective Governance, Risk and Compliance Management

February 20, 2017

Effective Governance, Risk and Compliance Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues for cloud vendors were “within touching distance” of $150 billion. Gartner also predicts that, a corporate ‘no-cloud’ policy will be

Read More
Vibhav

5 Simple Tips to Make Strong and Robust Business Continuity Plans

November 17, 2016

Business Continuity Plans Today’s organizations need comprehensive and robust business continuity planning for swift and effective action in case of a disaster or crisis. As the trade and supply chain have gone global, businesses today expect crisis response to be

Read More
Vibhav

Closing The Federal Government’s Tech Gap

October 18, 2016

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector

Read More
Vibhav

Four Tips For Better Information Security

September 21, 2016

Information Security Businesses are increasingly relying on cloud based application deployments and are open to entrusting their most critical data to it. Unlike the early days of cloud, now, there is wider acceptance that cloud-based data can be as secure

Read More
Vibhav

Web And Cybersecurity: 5 Things CISOs Need To Consider

August 18, 2015

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based on my discussions with information security managers and cloud architects

Read More
Vibhav

Layering Governance Over Cloud: Do Not Re-Build Perpetually!

May 5, 2015

Layering Governance Over Cloud  As the latest Amazon earnings announcement for AWS suggests, enterprises have adopted cloud at a rapid pace over the last few years as a part of the emerging Bimodal IT paradigm. However, given the focus on

Read More

Web Security: How Can GRC Help?

February 26, 2015

Cloud Security An integrated GRC approach to cloud acceptance, adoption and scale includes the risk perspective from the beginning. Harnessing the power of cloud security with a GRC framework can promote and improve information security practices and drive better business

Read More
RPA-Data
Accelerate Data Migration by 2X Ongoing trends in the Telco/DSP industry such as M&As, migration of the application to the cloud, and modernization of legacy applications have increased the frequency and scope of data migration ...
Louis
How to secure endpoints and identities Exposed, unknown endpoints on an enterprise’s network are more than a security threat; they are a brand liability. This week, Forrester’s Security and Risk Summit made a compelling case ...
Rajesh Khanna
Implement Hyperautomation to Scale Automation Programs by 3X Most Digital Service Providers (DSPs) struggle to accelerate their path to Hyperautomation due to the complex processes with legacy systems and applications. Although Robotic Process Automation (RPA) plays a ...
Louis
Employees’ privacy, personal identities and privileged access credentials are at risk because enterprises are sacrificing security to get more work done. While 85% of enterprises have a dedicated budget for mobile security, just over half, ...
Gamestop NFT
NFT Dividends A Non-Fungible Token (NFT) is a piece of data that is stored on a blockchain that certifies a digital asset to be unique. An NFT can represent pictures, videos, GIFs, audio and other ...