Simplify, Secure, and Scale with Splunk Cloud Migration Sindhu2025-10-10T12:17:03+05:30 In today’s digital-first landscape, operational resilience, real-time insights, and scalability are not just value-adds—they’re necessities. Organizations grappling with growing data... June 9, 2025By Sindhucyber security Read more...
Prevention Vs Detection: The Balancing Act! Safalya Mitra2025-10-10T15:46:45+05:30 COVID-19 – what’s the strategy to come out of the pandemic if I may ask? In medical science, it’s said –... April 26, 2022By Safalya Mitracyber security Read more...
Demystifying AISecOps & Why it’s important! Runa Tripathy2025-10-10T15:46:46+05:30 We are in a very interesting time where a lot of digital transformation is happening across. We are seeing security... February 23, 2022By Runa Tripathycyber security Read more...
Why do you Need Identity & Access Management Mounika Raghavarapu2025-10-10T16:05:43+05:30 As the number of applications your business uses expands, so does the need for increased security. Indeed, each year on... October 29, 2021By Mounika Raghavarapucyber security Read more...
What Defines A Modern Data Center? Mounika Raghavarapu2025-10-10T16:09:27+05:30 Modern data centers are very diverse than they were just a few years ago. Infrastructure has moved from old on-premises... October 20, 2021By Mounika Raghavarapucyber security Read more...
The Rising Threat of Ransomware Mounika Raghavarapu2025-10-10T16:25:52+05:30 The year 2020 has witnessed an exponential rise in the attack rate, as per cybersecurity researchers it is evident that the ransomware... July 31, 2021By Mounika Raghavarapucyber security Read more...
All you Need to Know about Ransomware Yogesh Potdar2025-10-10T16:31:48+05:30 Today, if there is one thing that CISOs dread most about is a ransomware attack. The scare of a possible... July 12, 2021By Yogesh Potdarcyber security Read more...
Secure Access Service Edge (SASE) – All you Need to Know! Sashidhar Dyamani2025-10-13T12:52:16+05:30 We have talked about moving away from security by traditionally securing perimeters-based approach, the pandemic has forced corporates to put... June 23, 2021By Sashidhar Dyamanicyber security Read more...
Application Security in a Cloud First World Sashidhar Dyamani2025-10-13T12:54:40+05:30 History is replete with anecdotes of engineers building secure information systems and hackers attempting to obtain unauthorized access to those... June 8, 2021By Sashidhar Dyamanicyber security Read more...
Future of Networking – ZTNA (Zero Trust Network Access) Sashidhar Dyamani2025-10-13T14:50:54+05:30 During the cold war, the Russian proverb "Doveryai, no proveryai" was very famous. US President Ronald Regan made its English version... May 24, 2021By Sashidhar Dyamanicyber security Read more...