| | October 20164CIOReviewEditorialThe foremost block of an effective cyber security campaign is a deep and updated understanding of the landscape where the threat looms. By supporting organizations to comprehend their attackers, the reason for the attack and what entity is most vulnerable helps enable an asset based approach to defenses. However there is a new issue that plagues the (Chief Information Security Officers) CISO's of today. It is the phenomenon of digital complexity. The digital world has redefined how enterprises communicate with their environments. There is no doubt that due to the rapid increase in the usage of technology in daily communications has led to more points of entry and larger breaches. However we know that the security market has not adopted the trends fast enough to combat the changes. Perhaps the way by which we can be able to trace and nip the attacks in the bud would be through the efficient monitoring of social media. The individuals today do not hold back in social media and share more content than any time before. It is imperative that cyber security policies are accounted for these instances and have to gain alignment quickly on the back of companies that are striving for a greater understanding of security measures. A good example found online is whaling, wherein hackers have began to target senior CXOs with ransomware and demand money or threaten to use the information fraudulently. Data encryption is not exactly a necessity in this scenario as it can even take the form of blackmails wherein a hacker threatens to make confidential data public. Strong password and cloud data access policies are more important than ever. Hence, security is only as good as the weakest point in the network; in many cases it has been proven to be the windows endpoint and user awareness. Hence the bigger concern is to protect the individual as a whole and not only their online profiles. Through this month's feature of "20 most promising Cyber Security companies" we cover organizations that delve deep into the network security issues of today and try to keep ahead of current cyber attackers through their innovative solutions and working methodologies. In the cover story feature we highlight the story of how Accolite's healthcare solutions help streamline business processes and preserve IT entities. Do let us know what you think, Vignesh AnantharajAssistant Managing Editorvignesh@cioreviewindia.comDemystifying Social Media Security CIOReviewCIOReviewVOL 4 · ISSUE 5 · OCTOBER - 2016 PublisherEditor-in-ChiefManaging EditorOffice Editorial queries editor@cioreviewindia.comAdvertising queriessales@cioreviewindia.comBangaloreTel 080 43112203DelhiTel 011 45992100 To subscribeVisit www.cioreviewindia.com/magazine-in or send email to: subscription@cioreviewindia.comCover price is Rs 150 per issueAshok KumarVirupakshi PattarSales & MarketingAmrit SinghKirankumar HLRavi KalgiAlok ChaturvediPradeep ShankarVignesh AnantharajGroup Art DirectorVP - Sales & MarketingMagendran PerumalCirculation ManagerEditorial TeamChitra MishraEmmanuel Christi DasRose Mary CIOReview No. 124, 2nd Floor, Surya Chambers, Old Airport Road, Murugheshpalya, Bangalore-560017MaitreyeeS SivasankarSuanya ChakrabortySr. VisualizerVisualizersPrinted and published by Alok Chaturvedi on Behalf of BizprintMedia Technologies Pvt Ltd and Printed at Precision Fototype Services at Sri Sabari Shopping Complex, 24 Residency Road Bangalore-560025 and Published at No. 124, 2nd Floor, Surya Chambers, Old Airport Road, Murugeshpalya, Bangalore-560017. Editor Pradeep ShankarCopyright © 2016 BizprintMedia Technologies Pvt Ltd, All rights reserved. Re-production in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher.
<
Page 3 |
Page 5 >