Home Search

Brian Pereira - search results

If you're not happy with the results, please do another search
Application Security

India Leaps Ahead in API Economy, Yet Lags in API Security: Report

0
The API economy is on a growth trajectory in India with increased digitalization. As more Indian consumers began to work from home last year,...

Skills CISOs Need to Have in 2021

0
These are turbulent times with the global pandemic impacting business. The threat landscape has also changed significantly. So, having good technical skills is not...
Cyber-Security-Threat-to-National-Power-Grids, Recorded Future

RedEcho Attacked 10 Indian Power Sector Companies and 2 Seaports: Recorded Future

0
Chinese state-actor hacker groups launched attacks on ten Indian power sector companies and two seaports since early last year. The latest attack occurred on...
Protecting 5G networks, Positive Technologies

Episode #9: Protecting 5G Networks from Sophisticated Cyberattacks

0
The U.K. is one of the most developed markets in Europe in terms of 5G deployments, as people and critical national infrastructure become more...
Cyberthreat Intelligence Strategies

“Threat intelligence teams are struggling to integrate external data with internal security telemetry”

0
To drive an effective security program, businesses need to have visibility into the organization’s threat landscape. But to do this, they need to consume...
Intel Labs, Federated Learning, Homomorphic Encryption

Episode #8: Intel Labs’ Breakthrough Research on Data Privacy and Encryption Technologies

0
Data privacy is now a big concern, not just for individuals, but also for organizations and governments. There’s data at rest, in transit, and...

“We believe there is a large opportunity in the digital identity and privilege management...

0
In an exclusive interview with Brian Pereira of CISO MAG, Umesh Padval, Venture Partner at Thomvest Ventures shares his thoughts on the current and...
remote desktop protocol (rdp)

What is an RDP attack?

0
Remote Desktop Protocol (RDP) attacks are becoming a nightmare for CISOs, CIOs, CTOs, and network administrators. They are an attack vector to enterprise networks....
Network Encryption, DSCI Whitepaper on Encryption

How Intel’s Homomorphic Encryption Can Process Ciphertext

0
Data Privacy is a big concern for governments and institutions. There are many debates about data residency, data stewardship, data ownership, and data privacy...
DEO data breach

How to Boost Amazon S3 Bucket Security

0
Misconfigured S3 buckets have led to major hacking incidents, for which the Magecart Group has been largely responsible. The Capital One data breach (100...

MOST POPULAR

RECENT POSTS