It takes about 100 days to detect an active advanced threat actor in your environment. As companies try to reduce this delay – via collecting even more data about their networks, users and applications to increase their visibility and deploy more intelligent systems to sift through this enormous data quickly and effectively- big data analytics and machine learning systems will take up centre stage…Read more
The biggest cyber security trend we witnessed this year in security communities in the Middle East was Incident Detection and Response. Security professionals are moving away from prevention and alerting systems to proactively hunt threats and respond to them before they can cause a catastrophic breach. However, not all enterprises can afford such capabilities in-house, so they turn to managed security providers that can offer this as a service…Read more
While security technologies have grown so have the tactics, techniques, and procedures cyber attackers use to penetrate your defences.
It wasn’t long ago when much of an organization’s daily business processes were fulfilled without the need for computers. All that computing devices provided was an ancillary support to an organization’s framework. Today, digital technology has completely upturned business processes and made them more efficient and effective, enabling us to extract greater productivity in significantly shorter durations of time…Read more
Security MEA speaks with Rajat Mohanty, Co-founder and Chief Executive Officer at Paladion on the role that artificial intelligence plays in cyber defense and the challenges that need to be overcome to stay ahead of attackers.
Today, the reality is that organizations are facing cyber threats that move too quickly. Security teams that depend on rules, correlation and signatures are ill equipped to handle the speed and velocity of such attacks…Read more
The primary reason cyber defenses are failing is the dependence on preventive defense. No organization can prevent a breach at all costs; regardless of how sophisticated their security technologies are. So, the focus should shift from a preventive approach to a hunting approach.
This year, 1.34 billion email accounts were compromised, and their information stolen when River City Media suffered a devastating data leak. The revealed information included actual names, user IP addresses, and physical addresses, besides email account information…Read more
Blockchain, the technology that’s used in the popular cryptocurrency ‘Bitcoin’, is revolutionary in many ways. It addresses multiple challenges associated with digital transactions, such as double spending and currency reproduction.
Employing blockchain also reduces the cost of online transactions while simultaneously increasing authenticity and security. The upshot is that the need for payment processors, custodians, and reconciliation bodies is eliminated. These benefits are amongst the prime reasons why the technology is being extensively deployed within the banking sector…Read more
IoT technology has emerged as one of the biggest game-changers in the global IT landscape. Its contribution is not merely limited to the IT sector, but it further expands from manufacturing to logistics operations, from smart wearables to sensors for endless use cases. Today, the technology has become the breeding ground for ultra modern phenomena including Industry 4.0, smart homes, and smart cities…Read more
India’s rise as a digital power not only requires digital awareness among the burgeoning set of internet users, it also demands the strengthening of the IT infrastructure with regards to security. India is making a quantum leap into the digital realm by integrating the entire nation in the digital fabric. Today, digital services have facilitated the simplification of a number of day-to-day processes, including banking, verifications, entertainment, availing government-led services and researching about any desired product or service online…Read more
IoT technology has emerged as one of the biggest game-changers in the global IT landscape. Its contribution is not merely limited to the IT sector, but it further expands from manufacturing to logistics operations, from smart wearables to sensors for endless use cases…Read more
Digital technologies have unlocked unprecedented avenues in the current market landscape for businesses. Today, it is as easy for a business to tap customers in its neighborhood as doing so on the other side of the globe. But this change and blurring of global boundaries has come with its own expense; a threat that leaves all businesses exposed to wide-ranging digital implications round the clock, throughout the year…Read more
The Middle East and Africa did remain relatively unscathed in the recent ransomware attacks, with only a few isolated cases reported across the region. But that doesn’t mean the region is invulnerable to such attacks. The recent wave of ransomware is just another example of attackers upping their ante to target critical infrastructure. It’s an unfortunate but crucial wake-up call for organisations and governments around the world to stay vigilant about data security…Read more
According to Amit Roy, EVP and regional head for EMEA at Paladion, the company shifted its gear to focus on ‘Speed’ as the new paradigm for security, given the fact that the threat landscape are evolving organically and it is not about if an organization will get breached or not but about how speedily can the organizations detect a threat and mitigate it…Read more
Effective cyber defense today needs lightning fast intelligence and rapid remediation. Attackers are now much faster and smarter than before. Enterprises can no longer take months, weeks, or even days to understand if attacks are in progress and what to do about them. It may be surprising therefore to know that a classic military concept from the last century is still an excellent basis for next generation cyber protection…Read more
“If the operation could be linked to an ongoing international armed conflict, then law of armed conflict would apply, at least to the extent that injury or physical damage was caused by it, and with respect to possible direct participation in hostilities by civilian hackers, but so far there are reports of neither,” said Tomáš Minárik, researcher at NATO CCD COE Law Branch…Read more
The second global scale malware attack in two months — Petya — that has crippled some of the largest corporations in the world is being pegged to be based on the same government surveillance tool, which was at the heart of its predecessor Wannacry that affected nearly 3,00,000 systems globally, including several in India. While Petya’s impact so far has been limited in India when compared with countries like Ukraine, Russia, and the US, experts suggest that what started with Wannacry could be used as an effective model by cyber-criminals going ahead…Read more
The worst fears of cyber experts have come true with the Petya ransomware attack rattling several countries, including India. Though experts and governments are yet to compile a list of attacks, internet security solutions firm Symantec has ranked India seventh in terms of number of victims…Read more
The recent cases of cybersecurity breaches and escalation in the number of computer malware attacks have raised a concern among customers and enterprises who deal with IoT devices. There is need to adopt a proper cybersecurity strategy on the part of businesses to safeguard their data from such malicious practices. Thus, a robust cybersecurity strategy today has become a “must-have” commodity…Read more
Paladion offers CyberActive MDR service from its SOCs using their proprietary Big Data security analytics and orchestration platform for advanced threat detection and response…Read more
View the full ReportPaladion—a global cyber defence company that provides managed detection and response services, DevOps security, Cyber Forensics, and Professional Services—today announced its placement in Forrester’s April 2017 report, Vendor Landscape: Global Managed Security Services…Read more
View the full ReportSpecialist cyber security company Paladion, which offers end-to-end information security services, has announced that it will soon launch the CyberActive command centre in the third quarter to be based in Dubai. The move is part of Paladion’s CyberActive security operation centres, which the company has in different parts of the world. The company made the revelation at the just ended Gulf Information Security Expo and Conference (GISEC) 2017…Read more
As the digital wave is penetrating tier II, III, and even rural areas, the apprehension has become more significant. Comprising a substantial portion of the population, the uninitiated users are most susceptible to digital crime and can fall victim to even the most basic digital threats due to low digital awareness…Read more
The interconnected nature of the internet has been a boon for society. Since inception, it has facilitated ceaseless sharing of information, thus, dramatically amplifying our knowledge through collaborations. Unfortunately, these characteristic advantages have also made the internet a breeding ground for unlawful activities…Read more
A weak data security framework can be hazardous for business and probably no one knows it better than TalkTalk, a telecommunication solutions provider in UK. In October 2015, the company faced a data breach where a minor bug was leveraged by attackers to bypass network restrictions and acquire customer data. This compromised financial data of close to 4% of its users and TalkTalk was recently fined a whopping £400,000 for its negligence…Read more
Data breaches can have ever lasting impact on an organization and the growing number of ransomware attacks on enterprises has kept Chief Security Officers on their toes. Though IoT connects web-enabled devices, lack of standardized architecture securing connected devices has opened up vulnerabilities. Defending from malicious activities and protecting data has gained top priority among the CSOs across organizations…Read more
The Indian economy is going cashless and digital. The move towards a cashless digital economy has made more people move to either digital banking or electronic transactions. Mobile wallets have become very popular along with other UPI based apps and BHIM. As online and digital transactions rise, cyber criminals have also become active, targeting mostly online payment platforms…Read more
Sunil Gupta, the COO, and Amit Roy, the regional sales head for EMEA region shared the stage as the speakers with leaders from the Banking & Financial World. Amit being a part of the panel discussion titled Boardroom Strategies: Defining a Security Roadmap for the Journey Ahead spoke about Security overview of threats, trends and lessons learnt from 2016…Read more
Watch Amit Roy, EVP and Regional Head EMEA, provide quick insights on the challenges today’s CISOs face. He is talking to ITP.net, a leading technology news site in the Gulf…Read more
A well-entrenched cyber security programme is an absolute must for any budding startups. Data breaches reached an all-time high last year. Millions of people were affected as hackers stole information via phishing emails, watering hole attacks and ransomware…Read more
Paladion, a global cyber security leader, announced today that Security Advisor Middle East, the region’s leading Information Security magazine awarded Paladion the “The Best Managed Security Services Provider of the Year 2016” at the Security Advisor Middle East Awards 2016…Read more
Paladion Networks, a global cyber security leader, announced today that UNICOM awarded Paladion’s RisqVU ADR “The Best Analytics Tool of the Year” at its India Analytics Summit 2016. Paladion’s RisqVU Active Detection and Response (ADR) is a Big Data based security analytics platform that helps discover unknown cyber threats through statistical models, machine learning algorithms, and visual analytics…Read more
Paladion, the world’s leading Managed Security Services Company, has announced today that it has been successful in securing significant multi -year Managed Services Contracts with two of the biggest financial institutions in the GCC…Read more
Cyberattacks are increasing both in terms of the number of attacks and sophistication such as the targeted attacks, ransomwares and advanced persistent threats. While the attacks and data breaches at large enterprises such as Sony or Target are highly publicised and get media attention, it does not mean that SMEs are not vulnerable to cyber attacks…Read more
IOT is a revolution in the making. It is possibly the only technology that has enterprise, consumer, and industrial use cases. The industrial use cases are also called Operational Technology or Industrial Internet of Things…Read more
The GCC cyber security market is estimated to grow over $10.41 billion by the end of 2022. Currently, cyber security solutions are acquiring a major share of the market because of an increase in the internet users in the GCC region with current estimation being approximately 40 million…Read more
Ransomware, as the name suggests, is a type of malware that encrypts data on your system and demands ransom for decrypting it. Advanced 128 to 256–bit encryption algorithms are used to encrypt data. In most cases, decryption without the key is not possible. Affected parties are paying up – data for such organizations and individuals is very valuable and losing it is not an option. The concept of extracting money from affected people / organizations has worked as data is important and is a lifeline…Read more
The major security trends will be around securing data with increased cloud adoption by enterprises and securing users who are increasingly mobile. Advanced malware and ransomware will continue to be main threat vector. For large enterprises, the use of big data security analytics to detect targeted attacks will become a necessity given the recent spate of breaches…Read more
Attack Attribution is all about finding out the entity that has successfully breached your cyber defences. This is an important consideration for forensic investigators, intelligence analysts, and national security officials. However, for most business organizations identifying the actual attacker may not be that critical. The idea here is: this is detective work meant more for cybercrime sleuths as part of their forensic analysis…Read more
Ransomware attacks have been the biggest pain point for enterprises. They have become a scourge for consumers, businesses and government institutions. According to a report by Trend Micro, India had been the victim of the highest number of ransomware infections during the second quarter of 2015. India’s position had risen from the eighth to number one…Read more
As financial institutions capitalize on new opportunities by providing online services, they continuously face security breaches. Let’s out out how a bank showed 50% reduction in security issues in the subsequent mobile applications and how these mobile applications were benchmarked against global and RBI security standards…Read more
Today, a data breach is a pain in the derriere for many enterprises. When a breach occurs, it is a nerve-wracking situation–typically an all-hands-on-deck moment. For instance, an attacker managing to corrupt data on the cloud could potentially cause colossal damage…Read more
SME owners along with CEOs of large enterprises today are losing sleep over information security concerns, despite investing heavily on technology to ensure better business performance. However, these technology investments are being made in the interest of innovating and accelerating the impact of technology for their customers rather than to protect the data itself…Read more
It is a comprehensive budget covering various sectors and is focused on growth. With regards to IT sector to be more specific, few positive aspects are – thrive on innovation and patents from India, extension of SEZ deduction, increased focus on digital initiatives spend including rural areas are few things to mention…Read more
Internet of Things is a revolution that has suddenly captured our imagination. As a technology, IoT is unique since it has a role to play in consumer, enterprise and industrial worlds. At the consumer level, the adoption of IoT for areas including home monitoring & control, wearable tech, and connected cars has already started. At the enterprise level building management, fleet management, hospital management, retail, telecom, and energy sectors are already adopting it for various benefits…Read more
Paladion in co-operation with Kaspersky will host a cyber security conference in Doha, Qatar on 17th February 2016.This event will be targeted at CIO’s, CISO’s, IT heads and senior management executives from large private and government enterprises across the country. A focal point of the conference will be Paladion’s unique cyber security framework CyberActive, an active cyber defense model that embeds robust protection in every fragment and continuously integrates threat intelligence for proactive mitigation of threats…Read more
The world, it was once said, is shrinking. This statement is profoundly out of place in the present day and age. Aided by the spectacular rise of the digital medium, today’s world has already shrunk enough to fit into our palms. Owing to the evolution of technologies such as cloud-based infrastructure, better bandwidth connectivity and improved wireless networking, there is no task – be it professional, personal or social – left untouched by this changing tide…Read more
Paladion is a specialized partner for information risk management, assisting its partners to improve their business operations by leveraging its industry-wide experience, expertise in cutting-edge technology and an extensive portfolio of services. Paladion is a robust managed security service provider, with over a decade of experience, trusted by organizations from around the globe from Asia to the US to EMEA…Read more
Today’s workforce is reliant on computers, laptops and smartphones as the infrastructural extensions of an organization. These devices, endowed with the power of the internet, carry important documents and passwords that form a virtual identity for organizations, especially with BYOD policies becoming a trend. Therefore, it is essential organizations ensure that they have the best of internet security to guarantee that their identity is not compromised or important data lost…Read more
There is widespread misconception that prioritizing web security is only a relevant concern for large corporations that operate in the public eye, and this leads many businesses to under appreciate the importance of investing in strong cyber protection…Read more
Brickwork India, the India representative of Fairfax County Economic Development Authority (FCEDA) organized the seminar on Global Expansion in Bangalore on July 23rd 2015. The seminar, conducted with the Indo-American Chamber of Commerce (IACC), highlighted the business opportunities in Fairfax County, Virginia – just outside Washington, DC – for Indian firms with IT services and solutions for the Cloud Computing, Big Data Analytics and Defence and Aerospace domains…Read more
It is very encouraging to see cyber security being given emphasis in the Digital India Campaign. India has a lot of talent and there are many entrepreneurs brimming with ideas on information security. The Digital India Campaign will give a boost to the Make In India Cyber Security Market…Read more
Safe Cities Briefing Day is a platform designed for the Middle East’s senior public sector officials to discuss ways of securing smart and connected cities using innovative technologies…Read more
With businesses growing significantly fast in today’s marketplace, the ability to monitor risks, whether for compliance purposes or security purposes, is critical. When an organization is small, information is safe and secure because there is a limited set of people who may access it…Read more
In many organisations today, a Security Information and Event Management (SIEM) solution is like a “white elephant,” expensive to maintain and adding very little value to the overall security posture of the organization…Read more
Copyright All Rights Reserved © 2020