In a conversation with CIO&Leader, Vamsi Krishna Ithamraj, CTO of Access Mutual Fund, shares his expertise on the current and future roles of AI and […]
AI-Powered Cyberattacks Are About to Get Much Worse—And Most Companies Aren’t Ready
World Economic Forum’s latest cybersecurity report reveals an alarming gap between emerging threats and organizational…
AI Customer Service Is Failing Your Expectations – Here’s What Companies Need to Fix Now
A new Zendesk report reveals the growing gap between AI promises and reality in customer…
The App Modernization Gap: Why Some Companies Are Racing Ahead While Others Fall Behind
Cloudflare’s 2026 App Innovation Report reveals a widening divide between tech leaders and laggards—and AI…
Should CISOs be the Data Protection Officers?
Whether you are the DPO or not, you will have to play a big role as the CISO to ensure that your organization is compliant […]
Are Human necessary to Cyber Threat Intelligence?
Given the increasing financial and reputational costs of breaches, an organization can no longer overlook human aspect of Cyber Intelligence The customary approach to organizational […]
Information Protection is Raison D’etra of Every Business
Trust is the cornerstone of every business and it is what businesses thrive on. Securing that trust is not an option but a business obligation—our […]
AI & its Implications on Information Security
The implications of artificial intelligence (AI) on information security include the potential risks posed by AI-driven cyber threats and the ways AI can be used […]
Cyberattack at one of the oldest Indian co-op banks, crores stolen?
Information of thousands of debit cards is also suspected to be stolen by cybercriminals in the malware attack Cosmos Bank, one of the oldest Indian […]
Application Security from a Data Protection Compliance Perspective
In a little over a decade, the World Wide Web has evolved from purely static information repositories into highly functional applications that process sensitive data […]
How to secure your hybrid cloud environment?
To keep pace with the digital economy, as enterprises race towards transforming into cloud-first businesses, the hybrid cloud environment has become commonplace. According to the Cloud […]
Leveraging Security Operations Center (SOC) in your cyber security journey
A Security Operations Center (SOC) is a centralized unit that deals with security issues on an organizational and technical level. The SOC consolidates under one […]
AI Regulation: SAP Supports Responsible Approach Amidst Global Development
While AI technology has made notable strides, particularly since the release of Open AI’s ChatGPT last year, the associated risks have been causing concerns among […]
