Varun Haran, DataBreachToday

Varun Haran

DataBreachToday

Mumbai, MH, India

Contact Varun

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • DataBreachToday
  • HealthcareInfoSec
  • BankInfoSecurity

Past articles by Varun:

Analysis: Verizon's Latest Data Breach Investigation Report

Verizon's Data Breach Investigations Report 2020 highlights the leading causes of breaches last year, including credential theft, phishing, ransomware as well as → Read More

Tips on Ransomware Defense Strategies

Healthcare institutions and non-profits are suffering badly from ransomware attacks, says Caleb Barlow, CEO of CynergisTek, who offers insights on shoring up → Read More

Behavioral Biometrics-Based Authentication: A Status Report

he quality of authentication provided by behavioral biometrics is improving, says James Stickland, CEO of Veridium. Nevertheless, he says, "we haven't reached → Read More

Actionable Threat Intel in the IoT Era

The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface. And as a result, the definition of threat → Read More

The Impact of Digital Transformation on Security

Identifying the data gaps in the rapidly expanding attack surface is critical to allow more sophisticated preventative, detective response capabilities, says Kory → Read More

Leveraging Hidden DNS Information to Fight Threats

The information provided in a domain name system is far deeper than just those transactions that take place. A DNS provides much more granular information around → Read More

Why Insider Threats Are Still a Critical Problem

Insider threats continue to be difficult to detect, says Ashish Thapar of Verizon, who offers a summary of a new report on these threats.. BankInfoSecurity → Read More

Authenticating in the Age of IoT

With the advent of the internet of things, authentication needs to be far more scalable than it ever was in the past, says Phillip Dunkelberger, CEO, Nok Nok Labs. → Read More

How Web Application Firewalls Are Evolving

Web application firewalls usually have not been a part of the DevSecOps conversation, but that's changing, says Andrew Peterson of Signal Sciences. → Read More

Telemetry: Monitoring Applications in Hostile Environments

Getting a telemetry stream back from applications can help organizations to "adjust much more quickly to see how practical attacks are happening on the → Read More

Can Machine Learning Systems 'Overlearn'?

Machine learning systems adapt their behavior on the basis of a feedback loop, so they can overlearn and develop blind spots, which if not understood by → Read More

The Growing Importance of 'Security by Design'

“Security by design” is at an inflection point as a result of advances in automation, orchestration, artificial intelligence and machine learning, says Lee → Read More

The Role of AI, Machine Learning in Email Security

Machine learning models and artificial intelligence are transforming the way email is secured, says Adrien Gendre of Vade Secure.. bank information security → Read More

Improving Threat Detection With AI

How can enterprises couple automated processes with human intelligence to improve threat detection? Brian NeSmith of Arctic Wolf shares insights. → Read More

OT Security: Best Practices for CISOs

The lack of standardization is one of the significant challenges when securing OT environments. Customizing and aligning OT security with the business is key, says → Read More

Fighting Credential Stuffing Attacks

Credential abuse attacks and identity theft incidents are rising, with attackers leveraging botnets to launch coordinated campaigns with high success rates, says → Read More

Using Unsupervised Machine Learning: The Challenges

While unsupervised machine learning techniques get away from the data labeling and classification that most supervised systems require, they are dependent on the → Read More

How IAM is Evolving in the Blockchain Era

Identity and access management is not about compliance anymore - It's really about security, says Gartner's Felix Gaehtgens. With cloud, virtualization, DevOps and → Read More

Securing 'East-West' Traffic in the Cloud

Protecting "East-West" cloud traffic - the traffic between apps and virtual machines - is a significant challenge, but microsegmentation can help address → Read More

Network vs. Endpoint Security: Striking the Right Balance

With so much focus on endpoint security, it's important not to overlook the importance of network-level security controls, says Lawrence Orans, research vice → Read More