Tag: Cybersecurity
Infosys to open new cyber defence centre in US soon
Indian IT major Infosys is all set to inaugurate a state-of-the-art Cyber Defence Centre in the US city of Indianapolis, the company's seventh such...
India launches Rs.8,000-cr quantum technology mission
India has launched a Rs. 8,000 crore national mission to gain supremacy in quantum computing, which can give the country exceptional powers to secure...
IT Secretary stresses on need to scale up efforts on the...
Citing the challenge of cyber threats in an increasingly connected world and rising number of computing devices, Ajay Prakash Sawhney, Secretary, Ministry of Electronics...
Quick Heal Technologies appoints Reetu Raina as CHRO
The cybersecurity products and solutions company Quick Heal Technologies Limited has announced that it has appointed Reetu Raina as its Chief Human Resource Officer...
Aegon Life Insurance appoints Kiran Belsekar as VP & CISO
Aegon Life Insurance has announced that it has appointed Kiran Belsekar as its Vice President and Chief Information Security Officer (CISO).
In this new role,...
DMI Finance appoints Manikant R Singh as CISO
Delhi-based DMI Finance has announced that it has appointed Manikant R Singh as its Chief Information Security Officer (CISO).
The company is a credit solutions...
Are you worried about your credit score? Know how FICO can...
In an exclusive interview with Anupama Suresh Mehra of Eletsonline, Vishal Goyal, Country Manager, South Asia, FICO, talks about how consumers can contribute data...
Micro Focus: Protecting organizations’ digital assets
IT security has, unfortunately, entered an era where organizations must assume of compromise, and then be able to respond accordingly. We, at Micro Focus,...
Lucideus Technologies raises $7 Mn funding from Japan’s MS&AD Ventures
New Delhi-based cybersecurity startup Lucideus Technologies have announced that it has raised USD 7 million through a funding round led by Japan’s MS&AD ventures. The funding...
CyberArk: Curbing Cyberattacks, Securing valuable Data
Attacks almost always involve the use of stolen privileged credentials, which represent the critical path for an attacker – the route to achieving the...