Advertisement

Data Privacy And Security Are Expected To Take A Positive Shape In India: Kunal Bajaj, CBO, eSec Forte Technologies

It should be inclusive of People Process and Technology and should be inspired from following principles of Identify, Protect, Detect, Respond, and Recover.

What is the latest cyber security concern businesses face these days?

Among many prevalent cyber security concerns that businesses face these days, some of the major ones are Skilled resources, emerging attack vectors, increased threat vectors due to remote working, increased compliances, threat to unknown - Unknown and data discovery have given hackers new ways to infiltrate organizations by exponentially expanding the attack surface.

What are the components of cybersecurity strategy?

It should be inclusive of People Process and Technology and should be inspired from following principles of Identify, Protect, Detect, Respond, and Recover.

How can any organization improve their cybersecurity?

Cybersecurity has been one of the major concerns for organizations, especially due to robot working. However, organizations can improve their cybersecurity by focusing on maturing people by providing them regular training, upskilling, and creating awareness, processes like Cyber Security Frameworks, compliances etc., and technologies like SOC, DLP, XDR, PAM to name a few.

What is the difference between threat intelligence and cybersecurity?

Threat intel is a part of cyber security – threat intel is basically organizations consuming intelligence about persistent cyber threats whereas cyber security as a whole is a larger subject.

Online Transactional Fraud are surging due to Cyber Security Violation, ways to combat these threats?

We believe regulatory agencies are working hard to educate and scale up organizations to emerging threats and changing landscape. There is a massive digital transformation wave which is strengthening our economy, but it also increases attack surface and targets.

There are robust compliances in place to help mitigate this.

How do ransomware attacks happen, can they be removed?

Ransomware attacks are attacks that typically encrypt user data and the key to decrypt the data is held against a ransom. Most Ransomware attacks happen via a malicious file delivered thru phishing emails, infected usb drives or as a payload bound to an exploit.

Pegasus and the law of Survelinece in India?

Pegasus has been one of the most talked-about attacks in the past few weeks. It has certainly raised questions related to privacy and data security.

Pegasus certainly sent out shockwaves and clear warnings that ‘anyone can be breached’.

I believe there is a lot of talk about Data Privacy and Security for Indian Nationals which is expected to take a positive and powerful shape. Pegasus has opened the dialogue around surveillance once again. IT laws in India limit their jurisdiction to legacy mediums, and surveillance via spyware needs to become a core part of the subject matter.

Tell us about your e Sec Forte Technologies?

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified Global Consultation and Implementation firm. The company is listed as Top 10 Cyber Security Companies in India.

Headquartered in Delhi, we have our delivery centres in Bangalore, Gurugram and Mumbai in India, Sri Lanka & Singapore. With 20+ solutions, eSec Forte has a Global partnerships with OEM’s such as Cato networks, Micro Focus, Access Data, Data Resolver to name a few.

The vast base of its clientele is spread across UAE, USA, UK, Kuwait, Singapore, Australia, Brazil, Malaysia, Canada, Taiwan, Egypt, Indonesia, Philippines and many more countries across the globe.

The team comprises a bunch of enthusiastic and vibrant engineers, computer application specialists, business management professionals, and experts in Information and Cyber security services, product development, and cloud-based solutions.

What are black hat, white hat and grey hat hackers?

Black Hat is the kind of hackers with malicious intention, illegal and are unauthorised.

White Hat are ethical hackers usually hired by organizations to validate their security infrastructure and controls.

On the other hand, Grey Hat Hackers are neither Black Hat nor White hat but more of grey hat hackers who often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to report the problem.



Around The World

Advertisement