CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Ashwin Krishnan
Tech Evangelist, Author, Blogger, Podcaster, Tech Moralist
Ashwin Krishnan is a technology industry expert with over two decades of experience in cybersecurity and cloud technologies. The author of Mobile Security for Dummies. A recognized thought leader, he is a regular columnist with CSOOnline.com, ITSPMagazine, ThriveGlobal, CPO Magazine and Qrius. He also regularly contributes to other publications including LightReading.com, Securitynow.com, CIOreview.com , SDxcentral.com, Virtual-Strategy.com, SoftwareMag.com, TEISS.co.uk, CloudTweaks.com. He is also frequently quoted in publications like Erpscan.com, DigitalGuardian, FutureOfEverything.com, TalkinCloud.com, EnterpriseProject, MRC & SiliconIndia.com. His speaking engagements include Mobile World Congress, CSA World Congress, ISACA, RSA Security Conference, VMWorld, Telecom Industry Association, and Product Camp Silicon Valley.


Image of man holding a tablet and an electronic brain projected above showing the concerns of AI and algorithms for EU GDPR compliance
BlogsData ProtectionSecurity Demystified

From GDPR to GIPR to GPPR to GAPR

March 1, 2018
Every business that collects data will have the Insights, Prediction, Action dilemma it confronts. And for that we need a regulatory framework to set boundaries. Am I allowed to dream on? Let’s not wait for regulations. An industry sponsored consortium putting consumer rights and privacy front and center.
Read More
Image of World Economic Forum (WEF) at a conference in Davos and the discussion of security and AI
BlogsCyber SecuritySecurity Demystified

WEF in Davos – Dominated by Security and AI – #Wow What a Long Way We Have Come!

February 2, 2018
Cybersecurity and AI has dominated the recently concluded WEF at Davos. Yet, there is still a lot more to be done in terms of close and constant cooperation between the pioneering private organizations and the forward thinking governments. Simple right? Easier said than done.
Read More
Image showing doctor speaking to patient
BlogsCyber SecuritySecurity Demystified

My Quest to end my Woes ends in a nought Outcome!

January 11, 2018
Innovative healthcare technology solutions are raising serious security and privacy concerns. And that has to be addressed. It needs to start with patient advocacy and transparency. And stricter regulations that can be tested by the patients.
Read More
Cheerful business person flying between hand drawn sky clouds
BlogsCyber SecuritySecurity Demystified

I Want to Have the ‘Cloud’ and the ‘Cake’ Too! – Part II

January 4, 2018
In Part I, I left you with a teaser about how a home moving dilemma is the state of the enterprise today for cloud migration. Let’s now dig into the challenges that CIOs and CSOs are facing today in their journey to the Hybrid Cloud.
Read More
Image of businessman sitting in office chair with arms wide open looking at the sky representing businesses embracing cloud technology
BlogsCyber SecuritySecurity Demystified

I Want to Have the ‘Cloud’ and the ‘Cake’ Too! – Part I

December 27, 2017
I was at the #Structure2017 conference and the term hybrid cloud (at last count a day and a half into a two-day conference) has been used 131 times. However – I hazard that between the panelists, interviewers or the audience members who used this term - all have different definitions interpretations of this catchphrase.
Read More

Latest

Police car siren flashing blue in the night showing third-party data breach

Greater Manchester Police Investigating a Third-Party Data Breach From a Ransomware Attack

Locks on laptop screen showing Iranian hackers target defense organizations with password spraying attacks

Iranian Hackers Use Password Spray Attacks to Compromise Defense Organizations, Pharmaceutical Firms

Jet engine from Airbus showing data breach involving compromised account

Airbus Data Breach from a Partner Airline’s Compromised Account Leaks Confidential Information

Hammer on table showing FTC order and privacy and security review

Investigation Finds Elon Musk May Have Violated FTC Order With Failure to Conduct Required Privacy and Security Review for “Twitter Blue”

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results