How Disruptive Technologies are Transforming the Cyber Security Landscape

Cyber Security

In this digital savvy world, what could be the most daunting nightmare of a technophile? Cyber-crime, evidently! Yes, online privacy and data breaches can shoot nervous breakdown of a tech-geek. And the way to ride out this issue is efficient cyber security, for sure! The nexus of techniques and tools to protect computer networks, programs, and data from illegitimate access or attacks is termed as cyber security.

With an influx of prevailing disruptive technologies such as artificial intelligence (AI), machine learning, and IoT, cyber security has attained yet another height of confidence in digital space. Rather than being a damage controller, it has become a prioritized commercial investment for a number of businesses. Organizations dealing in IT technologies in any form are enforcing artificial intelligence in the very security surface for enriched outcomes.

Observing the recent developments in AI, we can say that it can bring something great to the table. The technology has driven smart autonomous security systems which are able to learn themselves. Exploiting the flavors of machine learning and apt AI software, drawing the parallels alongside big data has become simpler. For a fact, AI algorithms are valuable for recognizing oddities from regular arrangements. The combination of cyber security and AI provides the path in creating a guideline of what is normal and what’s going wrong with the pattern. Other than this, AI with its supervised algorithms is capable of detecting threats on which they have been trained.

Advancements of such technologies in reference to global cyber security trends have played the role of market drivers as well.

Some of the major market players who have leveraged AI/ML for cyber defense are contributing significantly to the global plethora of cyber security. These tycoons are definitely setting the cyber security market stats to new bars. A recent report projects the cyber security market to be around $245 billion by 2023 globally.

In the next couple of years, the market size of cyber security is expected to show a positive acceleration in India as well. The country is amongst the fastest growing region for the cyber-companies and technologies which lures a hefty investment overall. India is undoubtedly well-geared in taking possible measures in securing networks across cyber space.

Widening the lenses, if we zoom into region-wise shielding for cyber-attacks, the US followed by Israel and Russia leads the strive for network security. The urge to survive in the rush of cyber-crimes has prepared these countries in the best way possible to discover and protect cyber threats. Canada, UK, Malaysia, China, France, Sweden, and Estonia are stationed next to them in curbing malware infections.

Cyber risk possesses a serious threat to a nation affecting the government, economic, organizational and citizen’s affair. Enterprises across the globe are emerging as countermeasure sheriffs for cyber-attacks. Understanding the certitude of network threats, cyber security is no longer a national affair, rather it has emerged out as an international concern where every commercial, non-commercial, governmental or non-governmental entity needs to adopt disruptive technologies to outperform profanity of malicious maneuver.

The post How Disruptive Technologies are Transforming the Cyber Security Landscape appeared first on Analytics Insight.

Cybersecurity and IoT Industry Facing Skill Shortage Leading to Development Issues

Businesses in the UK are going through a tough phase while finding the correct blend of cybersecurity and IoT skills, according to a report by Experis Industry Insider. The study examines the growth of IoT and how it is impacting the cybersecurity jobs market. As the industry professionals witnessing the emergence of IoT, they are becoming more considerate about the need of secured net for driving staff to perform efficiently in IoT empowered system.

An insight by Gartner foresees that 25 billion IoT-connected objects over the network will be used by 2021 giving a huge opportunity for businesses to equip data and optimize their operations for better user experience.

Looking at the other face of the coin, the emergence of IoT also invites a bundle of cyber threats to the desk. To succeed in the IoT world the businesses need to ensure the safety from exposing data to dangers.

Security enforcement should not be done only at the outer level; it needs to be inculcated during the building process of IoT devices only. Such devices become less vulnerable to cyber-attacks are less likely to attract malicious guests.

Let’s have a look at the stats presented by Experis Industry report:

• The report depicts – there were around 13,214 cybersecurity jobs showed in Q4 2018 — up 10 percent year-on-year and 16.6 percent from the previous quarter.

• Average cybersecurity salaries plunged 2 percent year-on-year to €58,557, whereas contractor day rates rose by 19.6% during the same period, to €505.

• The study discovered that while cybersecurity professionals demand keeps on rising, businesses are prioritizing short terms solutions hiring on a contract basis rather permanent hiring on their talent base.

• At present IoT is smaller jobs market, but the demand for IoT related roles also soared 48.8% to 4,968 in Q4 2018 — from 3,338 in the previous quarter.

• Permanent salaries and contractor as well, day rates also soared year-on-year, by 1.5% and 4% respectively.

• Demand for IoT technology skills is accelerating and are expected to soar even higher over the next few years.

With the flourishment of the cybersecurity market already, enterprises will need to think upon creative solutions to both skill sets which is necessary for secure nurturing of IoT technology.

Martin Ewings, director of Specialist Markets, Experis said that – “IoT offers huge opportunities for organizations if they have the right cyber security foundations in place to take advantage of new innovations safely. We can see that there is a strong demand for top talent, but the market is struggling to keep pace. Businesses are having to be creative and take a blended approach to their talent acquisition strategies – tapping into the contractor market to build a hybrid team of permanent and temporary workers. In doing so, they can have fast access to the skills they need right now while taking a longer-term view by building permanent capabilities and investing the time required to enable strategic development.”

• Job titles analysis reveals that front line workers are most in demand.

• More open vacancies are there in cybersecurity including security engineers, consultants, architects, analysts, and others.

Ewings further added, “The rise of IoT is transforming the world of cybersecurity and the focus is now on being able to spot, isolate and deal with anomalies in data.”

According to Ewings, “As more devices are connected, data is continually passing in and out of an organization. Trying to put a wall around all of it simply is not possible, so cybersecurity is shifting towards allowing data to pass unhindered, but monitoring it for unusual or unexpected patterns. We’re seeing the skills that are most in demand shift with this trend – from security information and event management (SIEM), in tools like LogRhythm, QRadar, and Splunk; to auditing and compliance experience with Qualys or knowledge of implementing holistic security tools from Sophos or Symantec.”

The post Cybersecurity and IoT Industry Facing Skill Shortage Leading to Development Issues appeared first on Analytics Insight.

The 5 Most Common Cyber Attacks & Ways to Avoid Them

Cyber Attacks

Open suspicious links received to your mailbox? Forget to update the system? Not using two-factor authentication? Congratulations – you’re at risk! However, there is no reason for panic. We tell you how to protect your PC from hackers and cyber attacks. The number of cybercrime continues to grow, and the situation is becoming more dangerous. Although the global side of the problem continues to grow, the main types of attacks do not change – they have been known for many years. No one is protected from hacking – neither ordinary users nor large corporations. Let’s look at the five most popular hacker attacks and ways to protect against them.

1. Viruses (Ransomware Viruses)

A virus is usually called malicious software that infects a computer or other computing device when a user opens an email attachment or follows a link to a malicious website. The ransomware virus is a specialized virus that encrypts all files in the system and does not give the user data until a ransom is paid. To reduce the likelihood of infection with similar viruses, you need to be vigilant and learn to recognize suspicious files and questionable requests. In addition, you must use security software, for example, solutions from Bestvpnrating.com or from any other specialized forums.

2. Potentially Unwanted Programs (PUP)

Potentially unwanted programs are trojans, spyware, or adware. They are usually installed along with another, useful program that the user decides to download. Such programs can secretly record all keystrokes, scan files on your hard drive, and read browser cookies. To protect against this threat, do not download or install applications, browser extensions, or other programs from unreliable websites. In addition, you should set up a regular backup of the contents of the device to an external disk or online backup service.

3. Phishing

Phishing is a way of hacking with the help of emails, in which the user is trying to cheat and force the one to transfer the login and password or other important information. Using email protection software for Internet privacy will help detect suspicious links and block spam and messages with malicious attachments, and multifactor authentication helps protect your account, even if the password has been stolen.

4. An Acc Hack

A hacker can gain access to a user account using a “frontal attack,” when a special program goes through a variety of login and password options – usually using a dictionary and other passwords stolen earlier. To prevent this from happening, you need to use VPN service and block login to your account after a certain number of login attempts. You can also protect yourself from automatic login attempts using a test that distinguishes a person from a robot, for example, reCAPTCHA.

5. Long-Updated or Outdated Software

Hackers can exploit vulnerabilities in system software and web applications to execute unauthorized code, gaining access to the system or stealing information. We can recall the example of Equifax – they had installed the Apache Struts web framework, which was not updated in time. This led to a rage of 143 million social security numbers (in the USA this is an important taxpayer identification sign), addresses, driver’s license numbers, and credit cards.

The post The 5 Most Common Cyber Attacks & Ways to Avoid Them appeared first on Analytics Insight.

How IBM is Adopting Automation in Cybersecurity

It might be a bold modern lifestyle in 2019 but at the same time, it’s a darn startling one for IT security professionals. Just take a look at some recent Gartner evaluations of the current security scenario.

• By 2020, 60% of digital organizations will endure real service disappointments, because of the powerlessness of IT security groups to manage the digital threat.

• By 2020, 60% of big business data security spending plans will be assigned for rapid detection and response approaches, which is an expansion from less than 30% in 2016.

• By 2018, 25% of corporate data traffic will stream legitimately from cell phones to the cloud, bypassing enterprise security controls.

• Through 2018, over half of IoT device producers won’t almost certainly address risks from poor authentication practices.

The fourth IBM cybersecurity survey uncovers how ill-equipped organizations are for a cyber attack. In spite of widespread acknowledgment that a strong cybersecurity plan can spare organizations critical harms in the wake of an assault, the survey demonstrates that numerous companies still don’t have an episode response plan set up and those that do have a solution are not trying it often.

This is particularly concerning given that in the previous two years 56% of UK companies surveyed encountered an information breach, and 62% said they encountered a cybersecurity episode. These incidents appear to come thick and quick with half of the companies that have gone through an information breach saying they encountered a few times in the year and 19% of those had encountered more than five.

Cybercrime is the 21st century’s managed crime. 80% of cyber attacks are driven by very sorted out crime rings in which information, tools and skills are generally shared. It is assessed that cybercrime will cost the worldwide economy more than $2 trillion by 2021 and represents what could be the biggest danger to each organization on the planet. The as of late released IBM-Ponemon Institute study uncovers that almost 79% of Indian firms don’t have a computer security incident response plan (CSIRP) set up that is connected reliably across operations. The risk situation demonstrates a noteworthy ascent in both number and modernity of breaches in the current year’s report, which is disturbing as it keeps on ascending in India.

Besides, as per a Nasscom, DSCI and PwC Report, the cyber security market has been anticipated to be $35 billion by 2025; including a million occupations and a 1,000 new businesses set up. In this way, there is an enormous addressable market for IBM in India. Today, the implications of a breach range the C-Suite, affecting financials, brand, customer loyalty, employee protection, legal/administrative issues, and so forth. Security is presently part of active board level issue and discussion.

IBM believes the deployment of AI inside security space is still at an early stage, anyway keeps on being a significant system. IBM is driving the adventure towards AI and Intelligent Automation in Cybersecurity. They predict both being a key need for CISOs as well as the whole C-Suite in 2019. Companies are seeing driving service agility and versatility in their digital business alongside data-driven security knowledge which can enable them to be prepared for any unanticipated dangers.

With regards to automation, security platforms will devise and execute controls dependent on recently detected risks and do it without human mediation. That decreases the time between a compromise and the time the risk is killed, diminishing the time window when assailants can do harm. Security analytics engine digest information from network gear and endpoints looking for peculiarities that show dangers. By setting a pattern for normal, these engines spot strange practices and evaluate whether they speak to malevolent action.

By fusing machine learning this innovation will grow its capacity to distinguish oddities in network traffic, however in the conduct of individual machines, users, and a combination of clients on specific machines. As these platforms become increasingly modern and confided in 2019, they will almost certainly spot attacks in prior stages and stop them before they become active ruptures.

In the realm of cybersecurity, we would all be able to concur on one thing: Change is consistent. We should consistently audit what we did yesterday and look out for approaches to improve. As cyber attacks develop in volume and multifaceted nature, artificial intelligence (AI) is helping under-resourced security operations analysts remain in front of dangers. There are three manners by which AI makes a difference:

Learn: AI is prepared by devouring billions of data artifacts from both organized and unstructured sources, for example, blogs and news stories. Through machine learning and deep learning methods, the AI improves its information to “comprehend” cybersecurity risks and cyber hazard.

Reason: AI accumulates insights and uses thinking to recognize the connections between risks, for example, noxious documents, suspicious IP locations or insiders. This analysis takes seconds or minutes, enabling security investigators to react to threats up to 60 times quicker.

Increase: AI dispenses with tedious research activities and gives s curated analysis of threats, reducing the amount of time security analysts take to settle on the complex decisions and launch a coordinated response to remediate the risk.

Consequently, to stay aware of the steady foes, companies should continually attempt new advancements like AI trying to discover better approaches to safeguard or proactively prevent an attack. They should evaluate their approaches and upgrade their techniques every day.

The post How IBM is Adopting Automation in Cybersecurity appeared first on Analytics Insight.

Cyber Security Approach Should Not Be Fear-Driven, Says NCSC Chief

With the rising frequency and scope of cyber attacks, it has become crucial that companies and government as well don’t operate over fear-based cybersecurity approach. According to the UK’s National Cyber Security Centre Chief Ciaran Martin, the fear-driven cybersecurity approach won’t be helpful for users and it can neither prevent attacks.

Martin considers cyber-arm of GCHQ as a tool to scare people to stay secure online. He compared the government’s approach to cybersecurity and Pixar Movie and said, “Four years ago, as GCHQ and government, we were still reluctantly in the role of the ‘Monsters Inc’ Top Scarcer. We still had to convince people about the threat and that it was all very scary and so forth.” He was addressing Infosecurity Europe 2019 in London.

Due to this approach, even the organization got scared and outsourced their cyber security as they believed that they could not get the hold of the problem themselves. According to NCSC chief, this is definitely not the correct approach towards cybersecurity.

Martin also quoted that, “That wasn’t the answer: the answer was people needing to own the problem for themselves. So in the last few years, we’ve been moving away from a fear-based approach to cybersecurity towards a pragmatic one where we’re trying to enable people to get on top of the problem.”

An Integrated Approach to 5G Cyber Security

The NCSC chief also delivered his thoughts regarding debate and argument that followed for several months over China-based Huawei technology firm. The issue of concern was that China is constructing a 5G network for the UK and what its possible outcome could be for national security.

Notably, President Donald Trump has already banned Huawei infrastructure from the USA.

However, the NCSC chief argued that the debate should be about 5G as a whole rather than revolving around one supplier.

Ciaran Martin stated, “We have to get 5G network security right — and that’s a much bigger issue than the national identity of suppliers. We’ve had all sorts of debates about the globalization and the role of China; there’s an absolutely legitimate debate to have, and we’ll talk about it more when the government has reached a final decision.”

According to Martin, cybersecurity experts should analyze and discuss the 5G security, as of now, to get the assurance that whosoever builds it, should be secure and in public welfare

He further explained, “For 5G security as a whole, we really need as experts to be talking about each bit and what we need to do to secure them — and we need to do that in an orderly and objective a way as possible.”

The NCSC chief added, “Because it’d be a real shame if one of the consequences of this 5G debate would be if we allowed the fear back into cybersecurity, where we had people scared of technology again because they shouldn’t be.”

The post Cyber Security Approach Should Not Be Fear-Driven, Says NCSC Chief appeared first on Analytics Insight.

Tech Mahindra and IIT Kanpur Collaborate to Address Future Cyber Security Challenges

Sign MoU to support joint academic initiatives and research

New Delhi / Kanpur, 10thJune,2019:Tech Mahindra Ltd. a leading provider of digital transformation, consulting and business re-engineering services and solutions, signed a Memorandum of Understanding (MOU) with Indian Institute of Technology Kanpur (IIT Kanpur) towards the knowledge enrichment and conducting joint research in the field of cybersecurity.

Through this partnership, Tech Mahindra will bring real world industry exposure to students of IIT Kanpur. Tech Mahindra will be working closely with IIT Kanpur on research projects to develop and foster an environment to deal with automation in cyber security and to enhance digital resilience of critical national infrastructure. As a part of this research partnership, Tech Mahindra will share real world challenges in cyber security with IIT Kanpur teams to find suitable solution.

Rajiv Singh, Global Head of Cybersecurity, Tech Mahindra, said, “At Tech Mahindra our primary objective is to ensure that the customer’s business is secured against national grade threats and attacks. Through our partnership with IIT Kanpur, we aim to collaborate and co-create superior research based solutions in cyber security. Our global experience of securing Enterprise and Telecom customers provides a great opportunity to build customized cybersecurity products in the space of Advanced Threat Management, Internet of Things (IoT), 5G, connected devices and securing Internet of Everything in our digital world.”

Prof. Abhay Karandikar, Director, IIT Kanpur, said, “We are excited to partner with Tech Mahindra for building innovative solutions in the area of Cyber Security. With IIT Kanpur’s strong footing in research capabilities and critical infrastructure, I am confident that our association with Tech Mahindra will lead to novel indigenous technology developments in Cyber Security.”

Prof. Sandeep K. Shukla, Head of the Department of Computer Science and Engineering, Joint coordinator, C3I Center, IIT Kanpur, said, “Cyber Security is our national imperative. Developing indigenous tools and technologies to protect the cyber infrastructure is of extreme importance. IIT Kanpur’s Center for Cyber Security and Cyber Defence of Critical Infrastructure (C3I center) is pleased to partner with Tech Mahindra in transferring technology developed at the center for commercialization by an Indian software company, as well as in further joint development in the cyber security space. We hope this joint research and development activity can become a model for academia-industry partnership in the country.”

As part of our TechMNxt charter, Tech Mahindra is betting big on next gen technologies like Cybersecurity to solve real business problems of the customers by delivering innovative solutions and services. The organisation, through its aggressive re-skilling and research programs, plans to develop internal capabilities to handle cyber security solution and expand its forte in the segment further.

About Tech Mahindra

Tech Mahindra represents the connected world, offering innovative and customer-centric information technology experiences, enabling Enterprises, Associates and the Society to Rise™. We are a USD 4.9 billion company with 121,000+ professionals across 90 countries, helping 938 global customers including Fortune 500 companies. Our convergent, digital, design experiences, innovation platforms and reusable assets connect across a number of technologies to deliver tangible business value and experiences to our stakeholders. Tech Mahindra is the highest ranked Non-U.S. company in the Forbes Global Digital 100 list (2018) and in the Forbes Fab 50 companies in Asia (2018).

We are part of the USD 21 billion Mahindra Group that employs more than 200,000 people in over 100 countries. The Group operates in the key industries that drive economic growth, enjoying a leadership position in tractors, utility vehicles, after-market, and information technology and vacation ownership.

Connect with us on www.techmahindra.com || Our Social Media Channels

For more information on Tech Mahindra, please contact:

Tuhina Pandey, Global Corporate Communications

Email: media.relations@techmahindra.com; Tuhina.Pandey@TechMahindra.com

PR Team: Kommune Brand Communications

Neha Koli/ Ayushi Dimri

+919717621084 / 9711144130

neha@kommune.in / ayushi@kommune.in

The post Tech Mahindra and IIT Kanpur Collaborate to Address Future Cyber Security Challenges appeared first on Analytics Insight.

Cybersecurity Risks Can Put M&A Deals in Jeopardy

Cybersecurity is a large concern to every company and individual and its related crimes will continue to rise. One report predicts that the average loss to companies could worth $5.2 trillion annually during the period of 2019-2024.

From small to large businesses, owners, and IT professionals at global corporations well aware that threats occur every day. Staying ahead of those menaces is the only way to secure proprietary data, network functionality, and network integrity. In mergers and acquisitions (M&A) industry, cybersecurity issues are progressively becoming a concern and that space can threaten deals or haunt buyers long after the deal is done, a new industry survey shows.

In a Forescout technologies Inc. survey, more than 2,700 information technology and business decision makers from 7 countries participated. Of those, 53% of respondents reported that their organization had unexpectedly experienced a grave cybersecurity issue or incident that put an M&A deal in danger. Conversely, 65% reported that they had experienced purchasers’ contrition because of cybersecurity concerns after closing a deal.

Issued earlier this week, the Forescout technologies’ survey findings demonstrate that taking the time to demeanor cybersecurity assessments is vital before and during an acquisition. It’s also significant in case of finalizing the deal gets delayed. Chief Technology and Public Officer at Forescout, Julie Cullivan says, “Cybersecurity is a challenge for every organization, and risk factors are changing all the time. It’s about making sure you put as much energy into it up front.”

Recent Events in M&A

Cyberattacks on companies or industries can do more than disrupt laws and regulations. A business that is being acquired or generally exploring a sale often desires a maximum return and the acquirer who took that company wants to ensure its target is valued appropriately and is a sustainable asset.

Recent acquisitions in companies accentuate the perils that cyber risks can pose to a business’s standing and bottom line.

An acquisition of Yahoo’s internet properties in 2017 by Verizon Communications Inc., where Verizon cut its offer by $350 million, meaning nearly 7% of the original price after Yahoo’s disclosure of two massive breaches in previous years. Moreover, the part of Yahoo that wasn’t sold to Verizon agreed to inherit 50% liability from any future lawsuits related to the data breaches, according to a PwC report.

In the same regard, Marriott International Inc. assumed a massive security risk, including a breach, after acquired Starwood and was unveiled just days after the deal was declared.

Cyber Attack risks not only put in jeopardy these types of companies. Recently, Asco Industries’ Spirit AeroSystems Holdings Inc., which agreed to acquire in May last year, was slammed by a large-scale ransomware attack. It caused a solemn disruption of Asco’s activities and its global sites in Belgium, Germany, Canada, and the US were stopped.

Though Spirit AeroSystems received EU approval for the deal in March, the acquisition has yet to be completed.

Cybersecurity consists of countless ground, ranging from website design, authentication progressions, protection from malware and ransomware, to data breaches, and even physical tampering with servers and network-connected devices.

According to the Senior Information Security Analyst and North America Privacy Officer for Haworth Inc., Joe Cardamone, “Thorough cybersecurity assessments that include utilizing third-party audits can often help avoid these types of issues.” Based in Holland, Michigan, Haworth Inc. is a designer and manufacturer of office furnishing products. As a Forescout customer, Haworth revamped its acquisition policy around 5-year ago to include information security.

The post Cybersecurity Risks Can Put M&A Deals in Jeopardy appeared first on Analytics Insight.

New Zealand to Invest $8 Million to Intensify Focus on Cybersecurity

The government of New Zealand has announced that it will intensify the focus on cybersecurity extracting the funding from 2019 budget and also considers the revision of cybersecurity strategies. The government has allocated around $8 million over the next 4 years in order to enforce its efforts.

The Minister of Broadcasting, Communications and Digital Media Kris Faafoi stated that the latest strategy marks four fundamentals for cybersecurity in the country:

1) Partnerships are crucial

2) People are secure and human rights are respected online

3) Economic growth is enhanced

4) National security is protected

The minister also quoted, “A lot of work went into hearing what was needed and what was important to the cybersecurity community, and how we could help New Zealanders be confident and secure in the digital world. We have to work together to keep individuals, businesses, community organizations and the private sector thriving online. It is important to stress that a focus on cybersecurity is critical across society and the economy.”

Faafoi further added, “This is why the strategy also sets out the government’s priorities on cybercrime and how New Zealand will continue to champion a free, open and secure internet internationally.”

New Zealand Joins Hands with Like-Minded Countries

The NZ government has decided to work in collaboration with like-minded countries to design framework promoting a peaceful and stable online ecosystem when state-sponsored cyber-attacks accelerate.

The international collaboration considers cyber risk as an increasing threat worldwide. The framework will be accompanied by state-sponsored cyber operations including tools that are designed to steal sensitive commercial data, disrupt the secure system and intervene in democratic processes’ data.

The minister also expressed his concern over international cyber risks and said that countries should be internationally active as one government only works locally to safeguard the data of one nation.

New Zealand had collaborated with Russia-backed NotPeyta (cyber-attack in 2017) over an international condemnation. NotPeyta initially targeted various entities of Ukraine including the power grid of the country resulting in a disruption in computer systems around the world.

The other priority areas of the strategy ensure NZ’s resistance to cyber threats, protection of critical information infrastructure, assistance to private and community organizations and securing the country’s interest of national security and law enforcement.

The post New Zealand to Invest $8 Million to Intensify Focus on Cybersecurity appeared first on Analytics Insight.

Cyber Security is One of the Most Important Strategic Discussions for Indian Banking Industry

Cyber Security

The present dispensation’s concentration on cyber security is helpful. Companies in India are grappling because of the developing number of untoward cyber attacks and their consequences. It is just when the companies, private or public, secure themselves that the nation will probably safeguard itself from this new type of warfare.

Curiously, cyber postures of companies in India are to a great extent dictated by their size. The bigger companies are regularly much on top of things in implementing cyber defense frameworks. The mid-market and smaller companies are regularly observed to struggle, all the more because of the mentality thinking that they’re small, they can’t be a target for cybercriminals. Without appropriate security controls, companies have deferred incident discovery and response and may some of the time even neglect to identify incidents, just to be told later by third parties

With rapidly developing interconnected business operations and growing digitisation, cyber security challenges will undoubtedly escalate. Successful estimates should be taken to guarantee security against cyber attacks and dangers. While the country focuses on the development, it’s also important to concentrate on the essentials that will help keep the development story on course.

After a seemingly endless amount of year after year, cyber attacks keep on heightening in recurrence, seriousness and effect. Detection and prevention techniques have demonstrated to a great extent incapable against the inexorably adept attacks, and numerous companies don’t have a clue what to do, or don’t have the resources to battle the present highly skilled and aggressive cybercriminals.

The BFSI fragment in India has seen growing scenarios of cyber attacks as of late. In addition, not has the number of attacks increased, yet its very nature has turned out to be more difficult to identify and prevent. According to different reports, cyber criminals focus on the BFSI area the most. Almost 22% to 25% of cyber attacks that stood out as truly newsworthy in the nation a year ago were from this area. With the occurrences of these dangers improbable to lessen, BFSI organizations are investigating every possibility to fortify their systems.

Playing out an exhaustive assessment of factors that add to the losses from cyber episodes remains an overwhelming task for banks in India, and subsequently, the genuine expense of cyber episodes is difficult to compute. A few factors that are regularly used to analyse the financial loss from cyber episodes incorporate loss of client business, legal, defense services, court repayments, examinations, forensics, and implementation of software for detection services and approaches among others.

Krishna Raj Sharma, CEO at iValue InfoSolutions stated that the digital age requests a creative rebuilding of the BFSI business. The introduction of new advancements and usage of innovative solutions, a totally different universe of opportunities are opening up. However, we can’t disregard the way that at the same time, it’s making another cyber attack surface and that is the place where people and our technology partners become an integral factor to support our customers.

The extreme improvement in cyber technologies has helped companies identify a greater number of episodes than before. A company would now be able to identify attackers as they enter its system, though prior it could just catch attackers on their way out, if by any means.

Another purpose behind the detection of more cyber incidents can be the intermingling of IT, operational technology and customer technology, which has helped companies adjust and develop plans of action, in any case, without a total comprehension of the dangers it involves. Therefore, it has been witnessed an expansion of incidents from cell phones, consumer devices, operational innovations and social media.

A recent summit was organised in Mumbai by iValue InfoSolutions, in association with Tenable, a Cyber Exposure organization wherein the fundamental topic of the event was to enable BFSI companies to perceive and lessen their cyber security dangers. More than 20 CIOs from the BFSI industry, prevalently the Public Sector Units (PSUs), took part in it. The participants discussed Tenable’s Cyber Exposure platform and the significance of vulnerability management in the banking business. During the discussions, IT pioneers shared their encounters and featured current advancements and innovation trends in the BFSI business.

According to Diwakar Dayal, Managing Director – India, Tenable, cyber security is never again a tactical capacity, it’s a strategic level discussion. As financial companies receive modern computing for competitive differentiation, CISOs must discover new ways to deal with overlooking their digital hazard. Cyber Exposure enables shared clients to oversee, measure and diminish their cyber exposure in the digital time.

BFSI organizations are quick to receive innovations like advanced analytics and business insight tools to recognize cyber assault trends, break down any fundamental associations and after that use these to address and resolve issues progressively. This will help their operations particularly as the majority of these organizations are centered around rustic areas of the nation, where security conventions are very dubious and subsequently vulnerability management turns out to be critical.

The post Cyber Security is One of the Most Important Strategic Discussions for Indian Banking Industry appeared first on Analytics Insight.

Interview with Ray Garnie, Senior Vice President- APAC, DigiCert

DigiCert is the world’s premier high-assurance digital certificate provider. The company simplifies SSL/TLS and PKI, and provide identity, authentication, and encryption solutions for the web and the Internet of Things (IoT). Analytics Insight spoke to Ray Garnie, Senior Vice President of APAC, DigiCert to understand how the company offers a robust platform which help enterprise manage their certificates across a large volume of devices using disruptive technologies.

Kindly brief us about the company, its specialization and the services it offers?

DigiCert is the world’s leading provider of TLS/SSL certificates for website security (think the padlock); PKI (public key infrastructure) and digital certificates for enterprise identity, authentication, integrity and encryption (VPN, secure email, enterprise mobility management, WiFi authentication, document signing, strong web authentication, IoT, smart card login), and related identity and authentication solutions. As an example of our global strength, 89% of the Fortune 500 and 97 of the world’s top 100 banks use us. DigiCert secures more than 28 billion web connections every day.

What makes DigiCert different from many other competitors?

No competitor can match our global reach, industry-leading customer support, modern technology infrastructure, or our level of expertise, as we are involved in creating internet security standards around the world. We offer the best technology globally, paired with local support and understanding. We have more than 12 offices around the world and offer support in dozens of languages, and our certificate management platforms are available in about a dozen languages. DigiCert offers a comprehensive suite of certificate products and certificate management platforms to address the needs of businesses of any size, and our platforms are built on APIs for easy integration into enterprise systems and popular development platforms. We offer specialized services as well, such as European Union trusted services for web authentication, TLS, digital signing and much more.

How are you looking to expand in Indian market?

We are working with our in-country technology partners, each of which have strong roots in India, to support their growth and offer our industry-leading solutions to the Indian market. Our support goes beyond just offering products: it also involves partnering to help market our solutions and build awareness among companies and their IT teams.

What’s your growth plans for the next 12 months?

Our market research analysis shows that Southeast Asia has huge potential for growth and DigiCert has signed a few strategic partners in Southeast Asia. The team will be investing and working closely with the partners to grow our business and take market share. We’re also currently finalizing in partnering with one of the largest cloud distributors globally and both teams have already started strategically planning on how to expand our product and branding across Australia, New Zealand, Singapore and Southeast Asia.

Tell us how your company is contributing in the IoT industry and how the company is benefiting the clients?

DigiCert is a leader in IoT security, providing highly scalable and automated PKI services for device manufacturers and companies deploying these systems. We are also involved in helping develop better security standards for the IoT and we manage PKI for several industry consortia of device manufacturers and others, having issued billions of certificates for these devices to-date. The types of devices that we secure with digital certificates include medical devices, smart televisions, smart meters in cities, USB Type-C charging devices, cable boxes, air travel — airplane-to-ground and ground-to-ground communication, payment terminals, etc.

PKI with digital certificates provide the following security benefits for IoT:

• Device-to-device authentication

• User-to-device authentication

• Signing code for integrity

• Secure boot of device

• Secure over-the-air updates

• Data encryption

DigiCert provides a robust platform to help companies manage their certificates across a huge volume of devices using automation. This helps them to order, install or provision, revoke and renew certificates. We support open standards like SCEP, EST and REST APIs and provide other solutions for device certificate provisioning and management.

How do you see the industry in the future ahead?

The IT industry is growing, as is the attack surface, with the exponential expansion of devices connected to the Internet (IoT). Likewise, agile development and expanded connectivity means that companies need to adopt a Secure by Design and Zero Trust mindset. No longer is there a definable perimeter to protect networks and data. Companies need to authenticate and encrypt every connection, application and device. The best way to do this in an interoperable way is to use digital certificates and good PKI implementations.

DigiCert helps our customers outsource the tremendous costs and skillsets required to manage compliance, data centers, and other hardware and software needed to run a trustworthy PKI and digital certificate infrastructure of their own. Companies can trust the world leader to ensure trust for their connected properties so that they can focus on what they do best. The use of PKI for the average business is exploding and our cloud-based platforms companies simplify managing all of this and doing it the right way to ensure good security.

The post Interview with Ray Garnie, Senior Vice President- APAC, DigiCert appeared first on Analytics Insight.