• Cover Story

    Paramount Defenses: Defending Cyber Security Infrastructures Worldwide

    Every day there are new reports of highly organized cyber-attacks. A staggering number of organizations revealed breaches of their networks last year. Hackers are continuously evolving their recon, mapping and exploitation efforts to gain access to back end servers that applications connect to while bypassing the traditional security perimeter of firewalls, intrusion detection and intrusion prevention systems.
Content

Business Boundaries are Dead. Long Live the "No Boundaries Business"

Suresh Batchu, Co-Founder, CTO & SVP Technology and Engineering, MobileIron

The Evolution Revolution: The Network and its Security is Changing, Are You Ready?

Mark Nunnikhoven, Vice President of Cloud & Emerging technologies, Trend Micro

Tackling Enterprise Security Through a Continuous Approach

Tackling Enterprise Security Through a Continuous Approach

A New Era of Opportunities and Challenges awaits Networking Industry

Jayshree Ullal, President & CEO, Arista Networks, Inc.

New Darwinism in Enterprise Security

Hemal Patel, MD & CEO, Cyberoam Technologies

Identity in the Connected World

Sowmya Das, CMO, Identiv Inc

Unknown Files: Closing the holes in Antivirus Security

Umesh Kumar Gupta, Head of Antivirus Research, Comodo Group

Cybersecurity Trends: Advanced Threat Detection

Rekha Shenoy, VP- Business and Corporate Development, Tripwire

HUMANS IN CYBER SPACE

Manish Gupta, Senior Vice President of Products, FireEye

Cyber Security in the Era of Big Data

Sam Harris, Director- Cyber Security and Enterprise Risk Management, Teradata Corporation