• Grid View
  • List View
  • Rb Gen ai Security - Generative AI-based Security Tools are, in Effect, Fighting Fire with Fire

    Generative AI-based Security Tools are, in Effect, Fighting Fire with Fire

    Following the cultural and technological explosion brought forth by the launch of OpenAI’s ChatGPT last fall, the security industry has seen enormous investment in technologies for large language models (LLMs), such as generative AI. While players like Google and Microsoft have launched new generative AI security products, IBM, CrowdStrike, and Tenable have integrated features into their existing products. Though each product has its own capabilities, the focal point is to automate threat hunting and prioritize breach alerts. However, the rise of generative AI also includes the opportunity for threat actors. It has potentially lowered the barrier of entry for cybercriminals to develop sophisticated business email compromise phishing campaigns, find and exploit zero-day vulnerabilities, probe for critical infrastructure, create and distribute malware, and much more.

    November, 2023

  • Fortifying Generative AI Microsofts Vigilance on Security Trust and Governance  - Fortifying Generative AI: Microsoft’s Vigilance on Security, Trust, and Governance

    Fortifying Generative AI: Microsoft’s Vigilance on Security, Trust, and Governance

    As businesses increasingly experiment with generative AI solutions to streamline their processes, it becomes clear that the risk environment is growing. Since threats change constantly, CIOs and CISOs are realizing more and more that AI and generative AI models need to be trusted with some decision-making to stay up with new threats. In line with this, cloud service providers and managed security service providers have made major investments in large language models for security applications during the past year. In this article, we highlight the efforts of Microsoft, focusing on the Microsoft AI Tour Mumbai event held in January.

    February, 2024

  • Aviation - Cybersecurity in Connected Aircraft: Risk Mitigation for Airlines, Passengers, Airports, and Service Providers

    Cybersecurity in Connected Aircraft: Risk Mitigation for Airlines, Passengers, Airports, and Service Providers

    The aviation industry is embracing a connected environment by digitizing its operations. This involves leveraging IoT devices, 5G networks, applied AI, advanced analytics, and SaaS-based applications to streamline maintenance, repair, and overhaul. A connected aircraft generates three types of information: aircraft control and navigation data, cabin-based in-flight entertainment data, and operations-based flight movement data. However, interconnected systems have greatly widened the risk perimeter. These demands call for applying security measures, including zero-trust security and secure by design principles, and collaborating with a technology partner who offers services such as threat detection, incident response, governance, risk and compliance, red teaming, 24x7 monitoring, and threat intelligence.

    January, 2023

  • Network and Digital Services were Never More Vital featured Image - Network and Digital Services were Never More Vital

    Network and Digital Services were Never More Vital

    As organizations emerge from the pandemic and adopt flexible hybrid operating models, the reliance on digital technologies has only increased, with mobility at its center point. The cloud, cybersecurity, and network form the foundational pillars to enable organizations to achieve digital transformation, as it requires unfettered access to data across the entire infrastructure. This Research Byte outlines what organizations must rapidly do to manage networks and infrastructure as they make the changes enacted during the pandemic permanent. It builds on findings from the Orange Business Services Analyst Event, held on July 6–7, 2022, and Avasant Research.

    September, 2022

  • PrimaryImage Digital Masters 2022 - Digital Masters 2022 RadarView™

    Digital Masters 2022 RadarView™

    The Digital Masters 2022 RadarView™ addresses the need for enterprises to understand the current landscape for adopting digital technologies. The report helps them identify implementation services providers best suited for executing transformation initiatives by supplying granular insights for each provider.The 88-page report also provides our point of view on how enterprises have changed the way they look at technology, outsourcing, and reprioritizing their digital investments.

    August, 2022

  • PrimaryImage Cybersecurity Services 2022 - Cybersecurity Services 2022 RadarView™

    Cybersecurity Services 2022 RadarView™

    The Cybersecurity Services 2022 RadarView™ is designed to inform enterprises about best practices in this space and provide a relatively granular understanding of key service providers. It provides a 360-degree view of key cybersecurity services providers across practice maturity, partner ecosystem, and investments and innovation, thereby supporting enterprises in identifying the right cybersecurity services partner. The 85-page report also highlights top market trends in the cybersecurity space and Avasant’s viewpoint.

    April, 2022

  • MoneyShot Cybersecurity Services 2022 RadarView Updated - Cybersecurity Services: Moving to a Proactive Security Posture

    Cybersecurity Services: Moving to a Proactive Security Posture

    The Russia-Ukraine war has further escalated cyber risks in an already precarious threat environment. Organizations continue to endure email cyberattacks involving phishing that are extending to their supply chain partners. As businesses modernize their IT infrastructure, there is increased interest in the zero-trust security model and deploying or refreshing security controls. These measures help companies move from a reactive to a proactive security operations center (SOC) by automating the triage process and incident response. These emerging trends are covered in Avasant’s Cybersecurity Services 2022 RadarView™.

    April, 2022

  • Security Tower 2 - Avasant Releases New Benchmarks for IT Security and Cybersecurity Spending

    Avasant Releases New Benchmarks for IT Security and Cybersecurity Spending

    Security and cybersecurity incidents are costly, with losses increasing every year. In light of these growing threats, it is no wonder that organizations in all industries continually rank security as a top priority for new spending. But how much are they spending? To answer this question, we have now released our new report, IT Security, Cybersecurity, and Compliance Spending and Staffing Benchmarks.

    February, 2022

  • Security Tower 2 - IT Security, Cybersecurity, and Compliance Spending Benchmarks 2022

    IT Security, Cybersecurity, and Compliance Spending Benchmarks 2022

    Security and cybersecurity incidents are costly, with losses increasing every year. It is no wonder, then, that organizations continually rank security as a top priority for new spending. But how much are they spending? This report provides spending and staffing benchmarks by industry and organization size for IT security, cybersecurity, and related compliance. Benchmarks are calculated by number of users, organization revenue, and percentage of IT spending, as well as by number of network devices, locations, and endpoints. Security staffing is calculated as a percentage of the IT staff and also per user. Industry benchmarks are provided for business services, financial services, critical infrastructure, public sector, healthcare, manufacturing/distribution, and retail. There is also a breakdown for identity/access management, security policy/awareness, cybersecurity/incident response, threat and vulnerability management, data privacy/security, and governance, risk, and compliance.

    February, 2022

  • IT Security Cybersecurity and Compliance Spending Benchmarks 450x450 - IT Security, Cybersecurity, and Compliance Spending Benchmarks 2023

    IT Security, Cybersecurity, and Compliance Spending Benchmarks 2023

    Security and cybersecurity incidents are costly, with losses increasing every year. It is no wonder, then, that organizations continually rank security as a top priority for new spending. But how much are they spending? This report provides spending and staffing benchmarks by industry and organization size for IT security, cybersecurity, and related compliance. Benchmarks are calculated by number of users, organization revenue, and percentage of IT spending, as well as by number of network devices, locations, and endpoints. Security staffing is calculated as a percentage of the IT staff and also per user. Industry benchmarks are provided for business services, financial services, critical infrastructure, public sector, healthcare, manufacturing/distribution, and retail. There is also a breakdown for identity/access management, security policy/awareness, cybersecurity/incident response, threat and vulnerability management, data privacy/security, and governance, risk, and compliance.

    May, 2023

  • WiproEdgile - Wipro’s Edgile Acquisition: Another Step in the Right Direction for Wipro’s Cybersecurity Aspirations

    Wipro’s Edgile Acquisition: Another Step in the Right Direction for Wipro’s Cybersecurity Aspirations

    IT service providers are looking to own the end-to-end cybersecurity adoption cycle and be part of the executive decision-making. This implies going beyond regular implementation and managed security services and offering consultancy and advisory services. Through Edgile, Wipro aims to achieve the following two goals: move up the value chain by playing an influential role in the initial stages of deals, which involve decision-making at the board or CXO leveland position itself as an end-to-end service provider by augmenting its cybersecurity consulting capabilities and covering the entire value chain.

    February, 2022

  • product image healthcare - Avasant Digital Forum: Building Healthcare's Digital Future

    Avasant Digital Forum: Building Healthcare’s Digital Future

    In recent years, advocates of telemedicine promised increased access to healthcare, better patient outcomes, and reduced costs. COVID-19 became an unexpected large-scale trial for telehealth. Remote patient monitoring, chronic disease management, virtual appointments, and other aspects of digital medicine showed earlier success in those trials. As vaccines and therapeutics reduce the load on healthcare providers, they should not look to return to their previous standards of care. Instead, they should look to continue with digital healthcare in their post-COVID plans.

    April, 2021

  • product post event image cyber - Avasant Digital Forum: The Age of Cyber Crime: Mitigating the Impact of Data Breaches

    Avasant Digital Forum: The Age of Cyber Crime: Mitigating the Impact of Data Breaches

    The recent Solarwinds breach has shown that cybercrime is a rapidly increasing threat to businesses and has become an inevitability. The business impact can range from loss of data to damaged consumer confidence and significant financial liabilities. While investing in cyber security is critical, there’s a fiduciary responsibility to have a mitigation plan against damage to business reputation and trust from a data breach. It’s important for every company to be prepared to handle the breach lifecycle – from Incident management to Impact assessment, Communication, Breach resolution and Recovery. 

    March, 2021

  • cybersecurity product image - Avasant Digital Forum: Securing The Enterprise In The Post Covid World: Next Generation Cyber Defense

    Avasant Digital Forum: Securing The Enterprise In The Post Covid World: Next Generation Cyber Defense

    As enterprises rapidly shift to Cloud, Agile and Edge computing, their cyber security strategy has to adapt. The pandemic has further escalated the cyber-risks as organizations shifted to Work from Home and virtualized their operations. The Post-COVID enterprise security strategies must include a Cloud-centric model that spans across the extended work boundaries and a hybrid/multi-cloud environment. Securing your data against cyber threats and ransomware in this Extended Enterprise is now one of the most critical priorities.  

    December, 2020

  • Primaryimage Enterprise security2020 - Enterprise Security Orchestration Platforms 2020 RadarView™

    Enterprise Security Orchestration Platforms 2020 RadarView™

    The Enterprise Security Orchestrion Platforms 2020 RadarView™ report is designed to help enterprises make strategic decisions to identify the best security orchestration platform to build their SOC. It assesses the platform providers based on automation capabilities, the number of predefined playbooks, built-in integrations, flexibility in the pricing model, efforts to reduce TCO, and the maturity and scale of the operation.

    October, 2020