India’s Transition To Digital Has Caused A Spike In Cyber Attacks, But They Can Be Fought

India’s rapid transition to a cashless economy since Prime Minister Narendra Modi’s demonetization drive has exposed new avenues for virulent cyber threats across the nation.

Greyhound Radio: Bringing Digital Transformation Home

Below is the replay of a recent Panel Discussion led by Sanchit Vir Gogia on the topic: Bringing Digital Transformation Home at Dimension Data Leadership Connect 2017.

Listen to the podcast here or on iTunes / SoundCloud:

Prefer seeing the video? No Problem! Click the TV icon at the end of this sentence to watch the replay in video format on Greyhound TV.    desktop

Greyhound TV: Bringing Digital Transformation Home

Below is the replay of a recent Panel Discussion led by Sanchit Vir Gogia on the topic: Bringing Digital Transformation Home at Dimension Data Leadership Connect 2017.

Watch the video here.

5 Reasons Why Symantec’s Acquisition Of Blue Coat Matters To The CIO’s Office

On 12 June, 2016 Symantec announced its agreement to acquire Blue Coat for USD 4.65 billion.

As a result of this acquisition, the company will now have 385,000 customers, a vast repository of data sources and over 3,000 researchers and engineers worldwide. Post this acquisition, Symantec will have USD 4.4 billion in combined revenue (on pro-forma, non-GAAP basis) in FY16. By the end of FY18, Symantec expects to realise USD 550 million in run-rate cost savings. In addition, the combined entity will have access to vast Security and Threat Intelligence data sources including Telemetry gathered from 175 million protected endpoints; more than 2 billion emails scanned per day; 1.2 billion web requests monitored per day across 55 languages; 12,000 Cloud applications monitored and controlled.

Is Symantec/Blue Coat Deal a Game-Changer?

Indian security leaders welcome the move, expected to be finalized later this year, saying it will definitely change the way technology is consumed by organizations, as they expect new innovations to help them tackle future threats more effectively.

Putting EMM Vendors Through Poodleattack Check: All But One Pass The Ring Of Fire

Earlier this morning I was chatting with a CIO of a large manufacturing organization with presence across multiple continents. They are currently benchmarking Mobile Device Management (MDM) vendors to help secure their mobile environment and we are helping them with this activity.

Putting EMM Vendors Through Poodle Attack Check: All But One Pass Ring of Fire

Earlier this morning I was chatting with a CIO of a large manufacturing organization with presence across multiple continents. They are currently benchmarking Mobile Device Management (MDM) vendors to help secure their mobile environment and we are helping them with this activity. As part of our rigorous methodology, we put 5 key vendors – Mass360 (owned by IBM), MobileIron, Good, Microsoft InTune and AirWatch (owned by VMware) – through the Poodle Attack Vulnerability check and results were amusing. While all vendors passed this test, AirWatch couldn’t make it to the finish line and got an overall rating of F. See pictures below for more details. We had reported another similar test last week where we found Microsoft’s Office365 vulnerable to the Poodle Attack.

Microsoft Office365 Impacted With Poodle Attack: Case Of Cloud Security Fallen Short

On a call earlier today (with an end-user client) I was discussing enterprise security norms around cloud-based productivity suite offerings. Like many IT Decision Makers who are taking the leap to the cloud, our client (based in the APJ region) is also currently evaluating cloud-based productivity suite options including both Microsoft Office 365 and Google Apps for Work. During our conversation I ran a quick Poodle Attack Vulnerability check (on www.ssllabs.com) and the results were worrisome. More below.

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Identity management: how the #cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on top of the legal and PR costs.

Five Ways for SMBs to Enter Emerging Markets Fast

Growing companies often look to developing markets for new opportunities; however, finding the right time to enter these markets can be a difficult balance. Recent research from Oxford Economics, sponsored by SAP, suggests that less than one-quarter of U.S. small and medium enterprises (SMEs) will be operating solely in the U.S. in three years. While SMEs are expanding their presence at a rapid rate in new markets, BRIC countries (Brazil, Russia, India, and China) are becoming old news: the acronym has been amended by many economists with “S” for South Africa, and lately, “I” for Indonesia. Other countries like Turkey and South Korea are ripe for entry even though they were hardly considered just a few years ago.

Facebook chat on ‘Future on Cloud Computing’ – Join The Conversation!

 

 

 

 

 

 

 

 

Nokia buys out Siemens from NSN Joint Venture

The joint venture between Nokia and Siemens is coming to a close with the former buying out the latter for €1.7bn. Nokia Siemens Networks (NSN) was founded in 2007 and saw the two European firms partner on providing networking infrastructure to telecoms companies across the globe.