Home Search

Brian Pereira - search results

If you're not happy with the results, please do another search
CEO, cybersecurity, CISO, Future of the CISO

“To be successful, CISOs must have intentionality and focus”

0
Most of today’s CISOs got into the role accidentally. Yet tomorrow’s CISO will have chosen this role by intent. It will be a chosen...
Podcast, Sameer Saxena, Business Development Head- Cybersecurity & MSSP, Inspira Enterprise India Pvt Ltd

Episode #1: How Digital Risk Management (DRM) is Changing During the Pandemic

0
 Episode #1  When the pandemic came along earlier this year, more businesses increased their reliance on digital infrastructure. Today, businesses rely heavily on digital processes to...

“Attackers are looking to break into your organization either by a broken VPN or...

0
It’s not every day that one gets to meet an influential person from the world of cybersecurity. CISO MAG caught up with Yotam Gutman,...
Armor Piercer

High Fidelity Alerts from XDR Tools can Reduce Alert Fatigue: Trend Micro

0
Did you know that the average organization receives 10,000 security alerts every day? A large organization, such as a bank, receives 100,000 – 200,000...
quantify business risk, Adam Palmer, Chief Cybersecurity Strategist, Tenable

“You can’t quantify business risk with RAG color coded scores”

0
A recent study by Forrester Research shows that 97% of Indian organizations experienced at least one business-impacting cyberattack in the past 12 months. Yet,...
blockchain-based social media, Parental Consent for Minors, Iranian Facebook accounts

Why You Should Avoid Social Logins and SSO

0
The Twitter accounts of top celebrities were recently hacked. You could be the next victim, only to be locked out of your Twitter account....
Cloud Security

Google Announces New Cloud Security and Analytics Solutions

0
Google Cloud Next ’20: OnAir kicked off today and Google announced new solutions across its smart data analytics and security portfolios, to help accelerate...
DDoS Attacks

DDoS Attacks and Credential Abuse Doubling Year-on-Year: Akamai

0
The key message that came through at the Akamai Edge Live APAC Virtual Summit 2020 on  July 2, 2020, was that the nature of...
Privilage management

Privileged Access Management is an Essential Component of an Organization’s IT Security Strategy

0
CISO MAG recently hosted a Virtual Roundtable with Ajay Kumar, Director, Solutions Engineering of BeyondTrust, and Sean Gunasekera, ASEAN Cyber Security Lead, EY. The...

Security Never Impedes Innovation but Helps It Move Forward

0
CISO MAG hosted its latest webinar in the Fireside Chat series with Ajay Kumar, Director of Solutions Engineering at BeyondTrust. The topic for the...

MOST POPULAR

RECENT POSTS