The world's privacy laws, including the EU's GDPR, generally have provisions that apply in times of a crisis, says Shivangi Nadkarni, CEO at Arrka Consulting in Mumbai. She describes how privacy laws should be followed in emergencies, such as the COVID-19 pandemic.
Today's digitized business processes have opened the door for more efficient operations, greater self service, and an optimized user experience. But they also expose the organization to new risks as external data enters the organization, potentially unchecked. And these new threats may be difficult to identify and...
Are you confident that your business critical data is protected? According to the recent market research Global Data Protection Index conducted by Vanson Bourne, the volume of data being managed is growing at a phenomenal rate from 1.53PB in 2016 to 9.47PB in 2018 in EMEA - but organizations are struggling with...
Purpose-built backup appliances (PBBAs) have been foundational
components to many organizations' backup/recovery infrastructure for
more than a decade. The importance of PBBAs is illustrated in the
numbers: According to IDC, in 2018, the data replication and protection
(DR&P) market was approximately $8.9 billion,...
The data era is changing how organizations think about, monetize and protect data. The volume of data being managed is growing at a phenomenal rate from 1.45PB in 2016 to 9.70PB in 2018. Data loss costs nearly 2x more than unplanned systems downtime. However, some organizations are better equipped than others to...
Not knowing where all the data resides in an organization is a major hurdle when it comes to protecting and securing that data, says Prakash Kumar Ranjan, senior manager and lead, IT and information security audit, Airtel Payments Bank.
As organizations plot their 2020 cybersecurity strategies, especially in light of privacy regulations, key data governance challenges are emerging. What are the critical issues, and how are they being addressed?
The Zero Trust model of information security has become a fixture in both the strategies of enterprise security teams and the roadmaps of security solution developers, and for good reason. Perimeter-focused security architectures that default to high trust levels on the internal network continue to fail disastrously...
A poor customer experience and insufficient security in the account opening process has been shown to directly and negatively impact long-term customer loyalty, retention and profitability. So, how do you provide a better and more secure customer experience in the digital account opening process?
More than 100...
Passwords are the access point to almost every system in our environment. Can they ever truly be replaced? John Bennett of LogMeIn talks about the steps necessary to create a secure, passwordless login experience.
To help security practitioners address their cybersecurity challenges, ISMG is hosting a Cybersecurity Summit on March 5 in Delhi. Among the speakers: Lt Gen (retd) Rajesh Pant, Dr Gulshan Rai and Col KP Bhat from NCIIPC.
"Identity is the new perimeter" is a common refrain. But what does it mean specifically in the healthcare context? Wes Wright, chief technology officer at Imprivata, discusses the challenge of securing digital identity in this sector.
Increasingly complex and sophisticated cyber-attacks are evading
traditional defenses, forcing firms to seek solutions beyond traditional
threat blocking and prevention mechanisms. Threat actors have had
success with phishing, zero-day malware/exploits, and fileless attacks and
are now cashing in on ransomware and...
For modern organizations, cyberattacks are
simply unavoidable. There is no hiding from
this fact. And if attacks are unavoidable,
then the key to effective protection is
speed and accuracy.
Organizations may believe in the critical importance of
speed but be unsure of how that translates into metrics.