• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

Companies turning to cognitive computing and AI to perform and optimise everyday tasks


By VARINDIA - 2018-11-16
Companies turning to cognitive computing and AI to perform and optimise everyday tasks

Rahul Arora, Regional Director, India & SAARC at Skybox Security tells VARINDIA of what the new IT function looks like and how IT is becoming a board agenda in his organization -

 

How is IT becoming a board agenda in your organisation?


Change is the only constant in today’s globalised world. Every business must make innovation a priority if they want to keep upthe pace with the competition. Consequently, a frequent topic of discussion at board meetings is these developments making them more vulnerable to cyberthreats. Any good business leader understands that security plays a crucial role in ensuring constant revenues and places it high on their priority list. They need to know if they have the right security management program in place equipped to take on their unique threats.The board and leadership as a whole should realize the need for visibility of their attack surface - to understand what the organisation’s unique cyber-risks are. CIOs today need contextual intelligence gained from the consolidation and analysis of a variety of data sources to create a visual, interactive model that links network topology, connections and organizational hierarchy so that they understand indicators of exposure (IOEs) - such as unsecured device configurations, risky access rules and exposed, exploited and exploitable vulnerabilities - to give the CIOs deep insight into the state of their security from the broadest possible range of sources. 

 

With advances in big data, open-source software, cloud computing, many firms are using cognitive computing and artificial intelligence to perform everyday tasks, what is your take on it? 


We understand the need of companies to turn to cognitive computing and artificial intelligence to perform and optimise everyday tasks. While not undermining the importance of AI, we would re-iterate that for the best cognitive computing and artificial intelligence soft-wares to work - basic security standards are a must.  For example, according to the report, Understanding Security Processes and the Need to Automateby Skybox Security and Osterman Research, which surveyed 465 Cyber security practitioners in large companies, it confirmed that they are still deficient in understanding network context and having visibility of firewall and security policy, including why firewall rules exist. Even more surprising, 39 percent of APAC respondents said they have only minimal or some understanding of how security changes impact their business. And it appears that identifying vulnerabilities continues to be a challenge, with 42 percent in APAC having only minimal or some understanding of what vulnerabilities exist on network devices.


Evidently, security staff are bogged down with incident response processes, compliance management and making changes to the security infrastructure. In APAC, respondents said they spend a “substantial” amount of time compliance management and security changes. 

 

What does the new IT function look like?


For any IT function to be effective, it is imperative that they put cybersecurity as a priority. A good cyber defence starts with good data. Having the capabilities to centralise and merge data between multi-vendor solutions will streamline analysis of firewall rulesets, vulnerability scan data, etc. However, being able to correlate disparate data and break down traditional silos - especially between data from the network layer and asset layer - are the first steps toward actionable intelligence. 


A threat-centric vulnerability management (TCVM) approach is the best practice because it analyses vulnerabilities from the perspective of potential business impacts, network exposure and exploitability. This way, TCVM is able to prioritise by risk unique to an organisation rather than generic severity scores and focus attention on the most dangerous threats. TCVM is also a proactive approach built to neutralise potential attack vectors before an attacker can leverage them. 


The TCVM process starts with centralised, up-to-date vulnerability occurrence data that is automatically correlated with CVSS scores, asset criticality and exploit availability and activity in the wild. Vulnerabilities are further analysed via attack simulations on an offline network model to identify which vulnerabilities are exposed to threat origins outside or within the organisation. Exposed vulnerabilities with active exploits in the wild represent the most critical risks and imminent threats to the organisation. Remediation is aligned with these priorities, and vulnerabilities are automatically matched to available patches and IPS signatures; the network model can also be used to plan network-based mitigation options that effectively shield vulnerabilities until they can be fully remediated.

 

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.