Managed security services initially came into the market under the garb of consulting and started taking off because it helped organizations bring in some measurability, says AvinashPrasad, vice president and head of the managed security services business at Tata Communications."The on-premises model was the norm and...
Managed security services initially came into the market under the garb of consulting and started taking off because it helped organizations bring in some measurability, says AvinashPrasad, vice president and head of the managed security services business at Tata Communications."The on-premises model was the norm and...
Managed security services initially came into the market under the garb of consulting and started taking off because it helped organizations bring in some measurability, says AvinashPrasad, vice president and head of the managed security services business at Tata Communications."The on-premises model was the norm and...
Tata Communication's AvinashPrasad clears up misconceptions about the emerging security-as-a-service model and describes the role it can play, especially at organizations growing through mergers and acquisitions.
Organizations in the Middle East and Central Asia are beginning to respond to the nuances of the evolving threat landscape in the region, says Tata Communication' AvinashPrasad in this exclusive interview.
Developing safe and effective information sharing practices to foster greater interoperability presents big challenges. As information sharing becomes increasingly vital in building resilient cybersecurity, the need to put a strong, collaborative structure in place is critical.
Although there are many options for...
Organizations in the Middle East and Central Asia are beginning to respond to the nuances of the evolving threat landscape in the region due to an explosion in its information and communications technology infrastructure, and this is changing the risk profile.
when addressing the advanced capabilities required to...
As of Q1 2018, the global cybersecurity community finds themselves inundated with both internal and external advanced threat actors who are stealthier, more resilient and sadly, more effective than they have ever been before. Many organizations are coming to terms with deciding whether their security posture is...
In the Face of Advanced Threats, is Your Organization's Security Posture Reactive or Proactive?
Today's most advanced threat actors - whether external or internal - are stealthier than ever and able to hide within one's systems for days, weeks or even months as they gather intel and prepare to strike. Sixty-one...
Planning your security programs to incorporate the right digital context - the IT environment, the business processes and the risks - is essential for success, says AvinashPrasad, vice president and head of the managed services business at Tata Communications.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.