IT hardware companies may require global certification, CIO News, ET CIO The government may ask laptop, server and other IT hardware importers to provide an international certification attesting that their product is from a trusted source before allowing a licence-free import of it, people in the know of the matter told ET. This certification, one of the people said, could ...
Read More »Author Archives: firewallssupportadmin
Sam Altman’s rebranded Worldcoin ramps up iris-scanning crypto project – ET CISO
Sam Altman’s rebranded Worldcoin ramps up iris-scanning crypto project – ET CISO https://etimg.etb2bimg.com/thumb/msid-114338159,imgsize-1410125,width-1200,height=765,overlay-etciso/next-gen-tech/sam-altmans-rebranded-worldcoin-ramps-up-iris-scanning-crypto-project.jpg Worldcoin, a cryptocurrency project founded by OpenAI CEO Sam Altman, said on Thursday it was rebranding to World Network and was ramping up efforts to scan every human’s iris using its “orb” devices. Its core offering is its World ID, which the company describes as a “digital ...
Read More »Cisco launches Secure Networking approach in India, CIO News, ET CIO
Cisco launches Secure Networking approach in India, CIO News, ET CIO Cisco has launched its Secure Networking approach in India, an innovative offer that combines advanced capabilities of networking and cybersecurity. The offer is built on the concept of zero trust to provide businesses with seamless and secure connectivity to tackle the risks of cybersecurity in a hybrid world. Amid ...
Read More »CISOs unpack API security strategy to secure digital transformation efforts – ET CISO
CISOs unpack API security strategy to secure digital transformation efforts – ET CISO https://etimg.etb2bimg.com/thumb/msid-114205122,imgsize-14052,width-1200,height=765,overlay-etciso/ciso-strategies/cisos-unpack-api-security-strategy-to-secure-digital-transformation-efforts.jpg APIs truly make the digital world go round. They are the backbone of digital transformation for both digital native and traditional businesses. But this also makes them a prime target for security threats. From API sprawl to Shadow APIs, the challenges are many. And strategies like ...
Read More »Major AI models not very transparent, says report, ET CIO
Major AI models not very transparent, says report, ET CIO Artificial intelligence (AI) based foundations models such as Meta’s Llama 2 and OpenAI’s GPT-4 are low on transparency, according to a global report. The Foundation Model Transparency Index created by a group of eight AI researchers from Stanford University, MIT Media Lab, and Princeton University, tracked 10 most popular AI ...
Read More »Government issues ‘high risk’ warning for Microsoft Windows users – ET CISO
Government issues ‘high risk’ warning for Microsoft Windows users – ET CISO https://etimg.etb2bimg.com/thumb/msid-114138621,imgsize-37016,width-1200,height=765,overlay-etciso/grc/government-issues-high-risk-warning-for-microsoft-windows-users.jpg The Indian Computer Emergency Response Team (CERT-In) has issued an advisory for Microsoft Windows users. The cyber security under the aegis of Ministry of Electronics and Information Technology said that it has discovered multiple vulnerabilities in Microsoft products including Microsoft Windows, Microsoft Office, Microsoft Azure, Developer Tools, ...
Read More »Upgrading beyond AD and PIM solutions, CIO News, ET CIO
Upgrading beyond AD and PIM solutions, CIO News, ET CIO Amit Chaudhury, VP & Practice Head – Cloud and Security, Bharti Airtel Every company has to keep its data and resources secure. It’s about time they try something new instead of the usual solutions like Active Directory (AD) and Privileged Identity Management (PIM). This is where identity governance steps in. ...
Read More »The digital heist: Strategies for remediating supply chain attacks – ET CISO
The digital heist: Strategies for remediating supply chain attacks – ET CISO https://etimg.etb2bimg.com/thumb/msid-114108203,imgsize-28516,width-1200,height=765,overlay-etciso/cybercrime-fraud/the-digital-heist-strategies-for-remediating-supply-chain-attacks.jpg In a world where code is the new currency, supply chain attacks are the heist of the digital age. Recent findings reveal a chilling trend: as open-source repositories become the playground for cybercriminals, the lack of oversight makes them particularly inviting targets. According to the 2024 Reversing ...
Read More »CERT-In finds multiple bugs in Microsoft Edge, advises users to update, ET CIO
CERT-In finds multiple bugs in Microsoft Edge, advises users to update, ET CIO New Delhi: The Indian Computer Emergency Response Team (CERT-In), which comes under the Ministry of Electronics & Information Technology, on Wednesday warned users of multiple vulnerabilities in Microsoft Edge which could allow an attacker to obtain sensitive information, bypass security restriction and cause denial-of-service (DoS) conditions on ...
Read More »Regulatory frameworks crucial in cybersecurity space: Quick Heal CEO Vishal Salvi – ET CISO
Regulatory frameworks crucial in cybersecurity space: Quick Heal CEO Vishal Salvi – ET CISO https://etimg.etb2bimg.com/thumb/msid-113898068,imgsize-1277718,width-1200,height=765,overlay-etciso/cybercrime-fraud/regulatory-frameworks-crucial-in-cybersecurity-space-quick-heal-ceo-vishal-salvi.jpg Regulations play a vital role in shaping the cybersecurity landscape by setting clear standards for protecting sensitive data and ensuring accountability across industries, said Vishal Salvi, CEO of Quick Heal Technologies. In an interview with PTI, Salvi highlighted the importance of frameworks and said that ...
Read More »