Select Records (Page) :
116
Government of West Bengal successfully established itself in transformation towards “being digital”
Keeping this in mind, Cyber Security Centre of Excellence, West Bengal has been relentlessly imparting customized awareness generation and skill building-trainings on cyber security to govt. employees, police officials, school teachers, professionals from industry ...
Zero Trust security architecture and Cloud are new tools for business continuity in new normal
Business Process Automation, adoption of emerging technologies by business and Industry 4.0 Smart Factory initiatives in manufacturing are complementing initiatives towards Digital India. ...
“Security has been the pinnacle and a buzz word for our organization”
As a responsible and people centric organization we had to systematize the processes and do a 180-degree change in our environment and redesign our system to make it ready for the digital environment. The priorities we have set for 2021 are:...
“We have always been pro-active as far as our organizational security practice is concerned”
Every company should invest liberally on security tools and technologies – lest, they may have to pay a bigger price due to non-compliance, business loss, brand erosion and loss of stock value and perhaps the IT Leader may have to pay a heavy price ...
IT hygiene is the first line of defense that an organization can adopt by identifying what we want to protect
The need of the hour was to enhance AI/Analytics models to help prevent issues and predict better and therefore investments should be focused in these areas. “Our strategy has been agile and will continue with same” and planning of IT spending in the coming future will depend on the business need....
As our cloud-based office setup was already in place, implementing WFH required minimal technical effort
Mobile cybersecurity risks are evolving at the same time as mobile technology. Smartphones, which today carry more data than older devices, are now used by 45% of mobile phone owners. Any new phone, tablet, or laptop provides a new way for...
The key is how organizations are uncovering risks in time and managing them within organizational risk appetite
Organizations need best of the breed, seasoned professionals who are capable to deep dive to uncover risks associated with new technologies and work with SMEs to wrap it with efficient controls at different levels. The key is how organizations ...
We leverage the innovative capabilities of the emerging technologies and cloud to help customers generate new revenue streams, increase efficiency, and deliver incredible experiences
Each step takes into account the realities of today’s cloud computing landscape and postulates how this space is likely to evolve in the future, including the important role that standards will play...
Going digital is the new normal and has become mainstream now
There is also a robust Data Leak Prevention (DLP) system implemented. The DLP solution is implemented at 3 layers – at the email gateway, at the internet gateway and on end points -...
Being Human Clothing adopted personal / hybrid / shared cloud as its IT strategy for long term
As I have mentioned earlier we have moved everything to a personal / hybrid / shared cloud and started using it extensively in the month of Jan 2020, hence we have changed our strategies according to being digital or compatible with cloud computing....