Cyber Security and Business Aviation

February 14, 2017

For being what IBM CEO Ginni Rometty calls ‘the greatest threat to every company in the world’1 , it’s surprising how little thought many of us give to cyber security in our day-to-day actions. Instead, we tend to brush it off as a problem for multinationals or something for the IT department to worry about. Yet this is a clear – and dangerous – misconception, as cyber security is not only a part of every IT discussion – but every business discussion.

Spotlight

Grofers

"Grofers is an on-demand delivery service that connects consumers with local merchants in the neighbourhood. Grofers offers a wide assortment of groceries, fruits & vegetables, cosmetics, electronics, bakery items, flowers and much more. Users can order through the app and get everything delivered to their doorstep. Grofers currently operates in the following cities: Agra, Ahmedabad, Bengaluru, Chandigarh, Chennai, Delhi NCR, Hyderabad, Indore, Jaipur, Kanpur, Kolkata, Lucknow, Mumbai, Nagpur, Pune, Vadodara and Surat."

OTHER WHITEPAPERS
news image

The Importance of Cybersecurity Threat Detection for Utilities

whitePaper | November 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are created equal.

Read More
news image

Cisco Secure and the NIST Cybersecurity Framework

whitePaper | December 6, 2022

Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Read More
news image

GBM Security Whitepaper

whitePaper | November 10, 2019

We are living in an era of digital disruption. Multiple industries are being disrupted, or fear being disrupted in the near future. Business models are evolving to cater to the dynamic markets and digital transformation that seems to be the answer to changing business models. Digital transformation is rapidly becoming a key priority in most industries, as organizations adapt to changing markets by leveraging technologies to build IT-centric business models. In general, organizations are using digital transformation to reach their goals of achieving greater agility, improving operational efficiency, improving customer experiences, and developing new revenue streams.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More

Spotlight

Grofers

"Grofers is an on-demand delivery service that connects consumers with local merchants in the neighbourhood. Grofers offers a wide assortment of groceries, fruits & vegetables, cosmetics, electronics, bakery items, flowers and much more. Users can order through the app and get everything delivered to their doorstep. Grofers currently operates in the following cities: Agra, Ahmedabad, Bengaluru, Chandigarh, Chennai, Delhi NCR, Hyderabad, Indore, Jaipur, Kanpur, Kolkata, Lucknow, Mumbai, Nagpur, Pune, Vadodara and Surat."

Events