As part of Singapore Tamil Language Festival 2022, Singapore Tamil Youths Club presents, Virtual Seminar Conference on “சமுதாய மாற்றத்தில் இளைஞரின் புத்தாக்கப் பணி”. Among others, I m speaking on Tamil domains internet security on 24th April, 2022. Please register at https://lnkd.in/ewQWgQzp Look forward to seeing you there! சிங்கப்பூர் தமிழ்மொழி விழா 2022ஐ முன்னிட்டு, சிங்கப்பூர் தமிழ் இளைஞர் கழகம் வழங்கும் “சமுதாய மாற்றத்தில் இளைஞரின் புத்தாக்கப் பணி”. எனும் கருத்தரங்கில், மற்றவர்களுடன் நானும் பேசுகிறேன். என் தலைப்பு: “ தமிழ் தளங்களில் இணையப் பாதுகாப்பு” அனைவரும் மெய் நிகர் அலைவழி கலந்து கொள்ள இச்சுட்டியில் பதிவு செய்யுமாறு கேட்டுக் கொள்கிறேன் https://lnkd.in/ewQWgQzp #cybersecuritynews #5gsecurity
Ganesh Narayanan’s Post
More Relevant Posts
-
If you learn, how to accept change, You are ready to manage any exchange! Had a fabulous time reciting my poem at the Esplanade Recital Hall packed with an August audience and elite literature enthusiasts. “Kaviperukku” or the abudant flow of emotional poetry rendered straight from the heart did propagate to that of the audience and it was evident from their response. Mellifluous music added to the ambience. Thanks a lot guitarist Isaru for playing the “Desh raga” for me. Thanks a lot Rajesh Kumar Dharmalingam for the opportunity. #esplanadesingapore #kaviperukku #poetrycommunity
To view or add a comment, sign in
-
Had the pleasure of delivering a keynote speech on Singapore’s IoT trends and IoT security at the CISO sit-down event hosted by JW Marriott South Beach Singapore today. It was a wonderful opportunity to share my insights on the latest IoT developments and their implications for security. Thank you to Telstra for the invitation to speak and for organizing such a successful event. #Telstra #IOTsecurity #sit-down
To view or add a comment, sign in
-
Join me on April 23rd at the CISO SEA Sit-Down event at JW Marriott, where I'll be sharing my insights on IoT adoption trends in Singapore. In my keynote speech, I'll be discussing the growth of IoT, potential vulnerabilities, and threat vectors. Additionally, I'll be providing some thoughts on curating an integrated, national strategy for IoT security. Don't miss out on this opportunity to learn about the latest trends and strategies in IoT security. See you there! #IoT #Singapore #Cybersecurity #Telstra
To view or add a comment, sign in
-
Role of AI in the world of SASE security: AI is transforming the world of Secure Access Service Edge (SASE) security operations. Here are some key areas where AI contributes to enhancing overall security resilience through machine learning techniques that manage a wider spectrum of threats compared to traditional security measures. 1. Enhanced Security: AI can enhance detection of DNS-based threats and unknown, evasive threats. 2. Cybersecurity: With AI and ML methodologies, SASE can identify phishing kits and prevent users from accessing malicious websites, enhancing the overall network security posture. 3. Operations: IT teams can leverage AI-based problem detection and predictive analytics to automate complex IT operations, reduce mean time to resolution (MTTR), and increase productivity. In summary, AI-powered SASE provides autonomous management and predictive analytics, enhancing operational efficiencies and helping identify and mitigate potential issues proactively. #SASE #Telstra
To view or add a comment, sign in
-
Understanding zero trust solutions is crucial in today's hyper-connected digital world. This security concept assumes that attackers have already breached network perimeter defenses, and as a result, does not automatically trust any user or device inside the perimeter. Zero trust solutions require all users and devices to be authenticated and authorized before accessing resources on the network, reducing the attack surface and making it difficult for attackers to move laterally within the network. Zero trust solutions typically include a combination of authentication and access control technologies, such as multi-factor authentication and least privilege access controls, as well as network segmentation and micro-segmentation technologies. By focusing on continuous identity verification and monitoring of activity, organizations can ensure only authorized users and devices have access to sensitive resources, detect and prevent malicious activity, and meet regulatory compliance requirements related to data privacy and security. At Telstra, we offer different types of zero trust solutions, including multi-factor authentication, identity and access management solutions, zero trust network access solutions, and secure access service edge (SASE). We provide a step-by-step consultative provisioning of zero trust security solutions, starting with defining your organization's specific security needs and goals and guiding you towards your target zero trust security posture. We help implement MFA and least privilege access controls, use network segmentation technologies to divide your network into smaller, isolated segments and control access between those segments, and offer managed zero trust solutions like Managed SASE/IAM to ensure your organization's security is protected both in North-South and East-West perimeters of your enterprise. Protect your sensitive data and meet your compliance obligations with our zero trust solutions. Contact us today to learn more. #Telstrapurple #Telstrasecurity
To view or add a comment, sign in
-
Amsterdam: The city's innovative spirit and high level of connectivity make it attractive to companies looking to expand their operations in Europe. At the same time, there is a thriving startup scene and a close connection between the academic and business ecosystems. Additionally, Amsterdam truly is the water city or city of canals. Venice should be called “Amsterdam of the south” and not the other way …just that it’s freezin’ cold!!
-
+3
To view or add a comment, sign in
-
We are taking part in the Singapore International Cyber Week at GovWare Marina Bay Sands from today (Tue 17 Oct) to Thu 19 Oct. If you have a #cybersecurity challenge you’re cracking your head to figure out, come over to the Telstra booth T02 and let’s have a chat. Let’s enhance your hyper-connected digital trust!
To view or add a comment, sign in
-
Is there something called “Air gap” in OT security ??? I can accept if it’s called a vacuum !!!😀😀 To err is human….and that’s enough!
To view or add a comment, sign in
-
Telstra Infinite Megatrends of hyperconnectivity, digital fabrics, cloud infrastructure and the increasing prevalence of machine-to-machine and human-to-machine interactions are shaping today’s enterprises. The ability for businesses to effectively and securely create, connect, contextualise and consume data will distinguish leaders from laggards. Tesltra today provided compelling insights on hyper connected digital infrastructure, digital fabric, powering the digital businesses that provide hyper-connected digital customer experiences managed by the all important Digital Trust! Let’s talk more on hyper-connected digital trust that remains as the sole sentinel for successful and reliable hyper-connected businesses.
To view or add a comment, sign in