Skip to main content
Home
Our ContributorsAbout
 
  • App Dev & Testing

    Get up to speed fast on the techniques behind successful enterprise application development, QA testing and software delivery from leading practitioners.

    View all   
    Five trends to watch

    The future of software testing: Machine learning to the rescue

    Clear the hurdles in your organization

    3 enterprise continuous testing challenges—and how to beat them

    Continuous learning is key

    The best agile and lean development conferences of 2021

    Great tools, best practices, and more

    Best of TechBeacon 2020: App dev and testing

    Build a better approach

    Best of TechBeacon 2020: DevOps

  • Enterprise IT

    Trends and best practices for provisioning, deploying, monitoring and managing enterprise IT systems. Understand challenges and best practices for ITOM, hybrid IT, ITSM and more.

    View all   
    INSPIRE 20 Diversity Inclusion Mark Martin
    Making diversity his mission

    INSPIRE 20 Podcast: Mark Martin, UKBlackTech

    Technology transformation pathway
    Follow this path

    Where should you start on your digital transformation journey?

    Torch the toil

    Why you should burn your IT ticketing system

    Tanya Janca
    A zebra walks into a meetup ...

    INSPIRE 20 Podcast: Tanya Janca, We Hack Purple

    Just say no to negative ROI

    8 things to consider before buying an AIOps tool

  • Security

    All things security for software engineering, DevOps, and IT Ops teams. Stay out front on application security, information security and data security.

    View all   
    Spot problems before you ship

    Secure your code review: 8 key questions to ask

    WhatsApp: Speak no evil
    Security Blogwatch

    STOP: Opt out of phone numbers as authentication tokens

    No Security

    The state of FHE: Don't believe the hype—but it is hopeful

    Your resilience relies on it

    Going serverless? Rethink your data security approach

    Dollar bill with embossed Bitcoin logo
    Security Blogwatch

    Cryptominers flooding GitHub—and other cloudy dev services

  • GUIDES
  • CONFERENCES
Subscribe
Home
  • Our Contributors
  • About
Subscribe
  • App Dev & Testing
  • Enterprise IT
  • Security
  • Guides
  • Conferences
  • Our Contributors
  • About
Subscribe
Guides
Conferences

About Sid Dutta

Sid Dutta
Sr. Data Security Products Executive
CyberRes
5 articles

Sid Dutta is an industry expert and leader in the cybersecurity space, specializing in data-centric security and privacy for CyberRes, a Micro Focus line of business. Sid comes from the enterprise side, and has led cybersecurity risk remediation programs and services globally at various large corporations in the financial services sector for a number of years. He heads Voltage SecureData Product Management, driving the solution strategy and roadmap, especially focusing on cloud enablement, cloud services integrations, big data, and Voltage SecureData-as-a-Service. Prior to that, he was the vice president and global head of data protection and applied cryptography at a large global payment processor. He also held the position of director of information security at one of the largest and most respected global credit card brands, responsible for end-to-end delivery and operations of data protection globally. In these roles, Sid has been a consumer of Voltage SecureData solution, and has implemented the solution globally, securing hybrid and multi-cloud workloads. 

  • Recent
  • Popular
Here's what you need to know about serverless and FaaS, and how to keep your data...
Sid Dutta
Usman Shafique
Apr 13, 2021
Going serverless? Rethink your data security approach
Your resilience relies on it
Here's how to ensure that the data you store in the cloud is useful for business analytics while still being protected from unauthorized access.
Sid Dutta
Dec 2, 2020
Cloud security and analytics: 4 lessons for data security teams
Take responsibility—or face consequences

Subscribe to TechBeacon

Get the best of TechBeacon, from App Dev & Testing to Security, delivered weekly.

SUBSCRIBE
There's a lot of confusion out there when it comes to certificates and establishing trust with online shopping. Here's what your team needs to know.
Sid Dutta
Jun 22, 2020
Online shopping: Beware of machine identity management loopholes
'Trust me' is not enough
Key and secrets management a problem? Here's a three-pronged strategic approach to adopt for better data protection.
Sid Dutta
May 27, 2020
Key and secrets management: The weak link in strong data protection
You’ve got me? Who’s got you?
If you can't bring your own encryption to the cloud, at least bring your own keys. Here's what your team needs to know about the choices.
Sid Dutta
Apr 20, 2020
What you need to know about 'bring your own key' in the cloud
Keep your keys by your side
Show More

Home

Brought to you by
HP

Topics

  • App Dev & Testing
  • Enterprise IT
  • Security
  • GUIDES
  • CONFERENCES

TechBeacon

  • About
  • Our Contributors
  • Terms of Use
  • Privacy
Cookie Privacy Manager

Subscribe to TechBeacon

Get the latest delivered straight to your inbox.

What topics interest you?

I'd like to receive emails from TechBeacon and Micro Focus to stay up-to-date on products, services, education, research, news, events, and promotions.

Sign up

Thanks for subscribing!

Check your email for the latest from TechBeacon.

© Copyright 2015 – 2022 Micro Focus or one of its affiliates
Back to top