close
close

Association-anemone

Bite-sized brilliance in every update

AI-powered cyberattacks are creating a new headache for businesses
asane

AI-powered cyberattacks are creating a new headache for businesses

“Building a strong digital foundation for modern organizations requires robust capabilities to prevent, respond and recover from cyber attacks. As AI-based threats grow and recovery becomes more complex, adopting a strategy centered on comprehensive resilience is critical. This includes investing in cyber resilience solutions, zero-trust controls and AI-assisted automation, and streamlining security tools through a platform-based approach,” said Jagadeshwar Gattu, President, Digital Foundation Services, HCLTech.

“Over the next one to two years, the primary goals for cybersecurity budgets are to improve compliance and move to real-time risk management, with security leaders predicting an average budget increase of 11 percent,” the report said.

These firms’ investment priorities include improving compliance and risk management, SOC (Security Operations Center) automation, incident response and recovery, and threat intelligence.

The report also highlights cyber automation, which automatically detects, investigates and remediates cyber threats – with or without human intervention – using a purpose-built software solution.

“Cybersecurity is a strategic capability for companies – and CISOs and CROs (Chief Risk Officers) must serve as a critical bridge between the board and

technology/business teams, moving to real-time risk governance and control execution to manage rapidly changing threat landscapes. As cyber threats evolve daily, effective implementation of a cyber strategy increasingly relies on automation and artificial intelligence,” said Amit Jain, Executive Vice President and Global Head, Cyber ​​Security Services, HCLTech.

The best IAM technology firms will invest

In the next year or two, the top digital identity or Identity and Access Management (IAM) technologies that organizations will invest in include identity governance, customer identity and access management, multi-factor authentication and single sign-on, and identity and access management. access to cars. .