Rik Chorus, Kyndryl: How to defend against evolving cybersecurity threats

Rik Chorus, Kyndryl’s director of security and resiliency & networking and edge, Benelux, discusses how the firm is helping organisation’s navigate their way through an ever-changing tech and business landscape.

Can you tell us a little bit about Kyndryl and what you do at the company?

There are a few things that I think are really interesting and that set Kyndryl apart from everything I've seen in the market so far. One of the things is that Kyndryl, as the...

ManageEngine launches cloud-native Identity platform

Who are you? written in Scrabble tiles.

ManageEngine, the enterprise IT management division of Zoho Corporation, has launched of Identity360, its cloud-native identity management platform that addresses identity and access management (IAM) complexities arising within enterprise workforces.

ManageEngine also announced the addition of access certification and identity risk assessment functions to ADManager Plus, its on-premises identity governance and administration (IGA) solution. These two functions enhance the...

Cyber Security & Cloud Congress North America Begins in Just a Few Days

Cybersecurity & Cloud Congress North America

[SANTA CLARA, CA, May 10, 2023] – The Cyber Security & Cloud Congress North America (part of TechEx) is scheduled to take place on May 17-18 at the prestigious Santa Clara Convention Centre in California.

This technology event brings together industry experts, thought leaders and innovative companies to explore the latest advancements, challenges, and opportunities in the realm of cybersecurity and cloud computing. As the digital landscape continues to evolve rapidly,...

James Todd, KPMG: On automation and machine learning as the future of security 

James Todd, SecOps director at KPMG, describes his role as a merging of SecOps, security architecture, and cloud security. It is a particularly interesting crossing point with regard to automation. 

“It’s at that intersection of the cloud environment, being very much aligned to deploying everything as code,” says Todd. “A lot of automation is a big part of that. Being able to take dynamic action within a cloud environment is much easier and well-versed than within a...

Andrew Egoroff, ProcessUnity: On the increased cybersecurity threat and mitigating risks

Cloud Tech caught up with Andrew Egoroff, Senior Cybersecurity Specialist at ProcessUnity, to discuss the increased threat around the Russia-Ukraine crisis and how to mitigate risks from third parties.

A business can implement excellent internal cybersecurity measures, but a slip-up from a third-party vendor can have devastating consequences. ProcessUnity specialises in helping businesses determine what vendors carry the lowest risk.

“We try and evangelise the...

Ben Jenkins, ThreatLocker: Dealing with the scourge of ransomware

A padlock on a shed.

Threatlocker was founded in 2017. What was it set up to do?

Endpoint security, and we do that by following zero trust. Now, the problem is zero trust is not the best name to describe things. And it's kind of this industry buzzword or buzz term that's come out that we kind of had to stick to using because it’s what people know. But we don't like to describe things as zero trust. 

Essentially, we do it through four main pillars. So we have our application...