Videos
Host Qiraat Attar, content strategist for Foundry India, interviews top chief information security officers throughout India to discuss current security threats, critical IT projects, security skills and careers, and much more.
When it comes to healthcare, India trusts AIIMS. And when you maintain the IT backbone of this renowned institution, the stakes are unparalleled. We sit down with Dr Susil Kumar Meher, Head Health IT of AIIMS, to get the pulse on how medicine and IT ...
Tech leaders face mounting uncertainties in cybersecurity and Generative AI. This panel session offers vital insights for tech leaders to protect their organizational data. Drawing upon real-world experiences and industry expertise, our panelists wil...
How does Bata espouse its tenets of quality and excellence when securing its cybersecurity frontiers? Do disruptions in supply chain hamper Bata's business and customer satisfaction? Charanjit Batia, Head of Cybersecurity and COE, lets us walk a mile...
When oil and gas infrastructure directly impact a nation's economy, how high are the stakes for cybersecurity? Is operational vulnerability the weak link, and what can a leader do to remedy that? Mrinal Kanti Roy, CISO, Cairn Oil and Gas answers thes...
Money is the lifeblood of any economy, and where it goes, progress follows. Hilal Lone, CISO of Razorpay sits down with us for an exclusive chat on the cash app’s emphasis on data privacy, how pertinent is the risk of fraud in the industry, and Ind...
Pradipta Kumar Patro, Global CISO and Head IT Platform of KEC International Limited (an RPG Group Company), discusses the technology trends that KEC International has incorporated in the business, their utilization of AI, and what his years in the bu...
Recently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations a...
VPNs are a remote work staple, but they’re hardly the most secure way to access corporate data. CSO Online’s UK Editor, Michael Hill, joins Juliet to explain why overreliance on VPNs poses a security risk, and what alternatives enterprises should...
The new Microsoft Defender for Business makes important Windows security features more available to small businesses.
CISO Joanna Burkey shares how HP, Inc. leverages a balanced, zero trust model that leans on modern tools and practices and diverse talent.
With more than 3 million cybersecurity roles estimated to be unfilled across the globe, security leaders must evolve their hiring and team development strategies. Learn what a smarter approach to recruitment and retention will mean for organizations.
XDR is one of security's buzziest acronyms—and for good reason. XDR, which stands for eXtended Detection and Response, promises to provide more timely and accurate threat detection by gathering and processing data from an integrated set of security...
As enterprises build up their mobile, edge and cloud deployments, they're being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud...
Set aside some time to inventory and analyze the software and settings on your network to identify risks.
With more than 35,000 employees covering the insurance needs of more than 6 million members in Pennsylvania, Delaware, West Virginia and New York, Highmark Health is an independent licensee of the Blue Cross Blue Shield Association. CISO Omar Khawaja...
Minneapolis-based Target Corporation serves guests at nearly 1,900 stores and at Target.com. Of all of the industries impacted severely by the pandemic, retail was one hit most drastically. Yet Target was one of those businesses that was able to tran...
With 24,000 employees and customers in more than 100 countries, Rockwell Automation is a global leader in industrial automation and digital transformation. As industries rely more and more on operational technology (OT), they can be vulnerable if the...
A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.
Celanese Corporation is a global chemical leader in the production of differentiated chemistry solutions and specialty materials used in most major industries and consumer applications. With IT and OT environments exposed to risk, the organization mu...
SMBs typically outsource some or all their IT services to an MSP. Here’s how to find one that takes security seriously.