Data Security, Enterprise Identity, Software Security

Cisco Secure and the NIST Cybersecurity Framework

December 6, 2022

Cisco Secure and the NIST Cybersecurity Framework
Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Spotlight

Tech Mahindra

Tech Mahindra represents the connected world, offering Consulting, Digital Transformation, Integrated Engineering, Business Services and Solutions, enabling Enterprises, Associates and the Society to Rise™. We are a USD 3.9 billion company with 105,200+ professionals across 90 countries, helping 750+ global customers including several Fortune 500 companies. Our innovative services, platforms, products, solutions and reusable assets connect across a number of technologies to deliver tangible business value to our stakeholders. Tech Mahindra is winner of Forbes 2014 Asia Fab 50, Deloitte Tech Fast 50, the CIO 100 among other awards.

OTHER WHITEPAPERS
news image

2022 Trends in Securing Digital Identities

whitePaper | August 22, 2022

Managing the ecosystem of identities accessing enterprise resources has only gotten more complicated during the past several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under pressure to ensure the army of remote workers, contractors, and employees accessing network resources are doing so securely and successfully.

Read More
news image

Awesome Cyber Security Facts - Infographic

whitePaper | November 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | December 15, 2019

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Cisco Spaces – Privacy and Data Protection

whitePaper | December 2, 2022

Cisco Spaces is an indoor location services cloud platform that provides wireless customers with rich locationbased services, including location analytics, business insight, customer experience management, asset tracking, Bluetooth Low Energy (BLE) management, and API.

Read More

Spotlight

Tech Mahindra

Tech Mahindra represents the connected world, offering Consulting, Digital Transformation, Integrated Engineering, Business Services and Solutions, enabling Enterprises, Associates and the Society to Rise™. We are a USD 3.9 billion company with 105,200+ professionals across 90 countries, helping 750+ global customers including several Fortune 500 companies. Our innovative services, platforms, products, solutions and reusable assets connect across a number of technologies to deliver tangible business value to our stakeholders. Tech Mahindra is winner of Forbes 2014 Asia Fab 50, Deloitte Tech Fast 50, the CIO 100 among other awards.

Events