Iniciar sesión para ver el perfil completo de Marcel
o
¿Ya eres miembro de LinkedIn? Inicia sesión
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
Marcel Velica
Madrid, Comunidad de Madrid, España
57 mil seguidores
Más de 500 contactos
Ver tus contactos en común con Marcel
Marcel puede presentarte a 4 personas en Eventbrite
Unirse con el email
o
¿Ya eres miembro de LinkedIn? Inicia sesión
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
Ver tus contactos en común con Marcel
o
¿Ya eres miembro de LinkedIn? Inicia sesión
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
Acerca de
¡Hola de nuevo!
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
Artículos de Marcel
-
Securing Sensitive Data Across Your Cloud Workspace
Securing Sensitive Data Across Your Cloud Workspace
Traditional email security was built around one idea: stopping inbound threats like phishing and malware. But this…
175
88 comentarios -
The Era of Proactive Cyber: When Defense Stops Being Enough9 abr 2026
The Era of Proactive Cyber: When Defense Stops Being Enough
For over two decades, cybersecurity has operated on a familiar loop: detect, respond, patch, repeat. It was a model…
239
93 comentarios -
Critical Langflow RCE Exploited Within Hours: A Wake-Up Call for AI Security2 abr 2026
Critical Langflow RCE Exploited Within Hours: A Wake-Up Call for AI Security
The point of weakness in Langflow is a serious vulnerability that reveals a troubling fact about the current AI…
228
69 comentarios -
Closing the Gap Between AI Security Plans and Real-World Defense26 mar 2026
Closing the Gap Between AI Security Plans and Real-World Defense
Each CISO can take action when a serious threat arises. Pushing leads to clarity, and during such instances, security…
239
102 comentarios -
AI Hype vs Reality: What Security Leaders Are Experiencing Today19 mar 2026
AI Hype vs Reality: What Security Leaders Are Experiencing Today
During a recent closed-door roundtable session, senior security executives of professional sports, the financial…
207
116 comentarios -
CyberStrikeAI and the New Era of AI-Augmented Cyberattacks12 mar 2026
CyberStrikeAI and the New Era of AI-Augmented Cyberattacks
AI is changing not only the scene of the cybersecurity defenders but also that of attackers. The advent of…
224
55 comentarios -
How Archive Is Revolutionizing Influencer Marketing for Brands5 mar 2026
How Archive Is Revolutionizing Influencer Marketing for Brands
In the modern digital environment, where everything moves at a rapid pace, the concept of influencer marketing has long…
772
398 comentarios -
A Majority of CISOs (69%) Are Exploring New Career Paths, Including Leaving the Role Entirely12 feb 2026
A Majority of CISOs (69%) Are Exploring New Career Paths, Including Leaving the Role Entirely
The cybersecurity leadership environment is undergoing structural transformation. A recent study by the company "IA…
187
92 comentarios -
CleanMyMac: Complete Mac Care for Performance, Security, and Digital Clarity5 feb 2026
CleanMyMac: Complete Mac Care for Performance, Security, and Digital Clarity
The effects became clear soon after I made CleanMyMac a routine part of maintaining my Mac. Storage became more…
1053
584 comentarios -
Cybersecurity in 2026: Preparing for AI-Powered Threats and Worldwide Transformation18 dic 2025
Cybersecurity in 2026: Preparing for AI-Powered Threats and Worldwide Transformation
By the end of 2025, the only certainty is that the cyber threat landscape in 2026 will differ significantly from what…
153
99 comentarios
Actividad
57 mil seguidores
-
Marcel Velica ha compartido estoIf you're thinking email security is enough… you're already behind. Read the full article to understand the real risk across your cloud workspace 👇https://lnkd.in/eV9XWjbK Follow Marcel Velica for more & share with your network.Securing Sensitive Data Across Your Cloud WorkspaceSecuring Sensitive Data Across Your Cloud WorkspaceMarcel Velica
-
Marcel Velica ha compartido estoMost AI presentation tools give you 3 things a blank canvas, a loading bar, and the same result as everyone else. Decktopus AI just shipped new technology! and the architecture is fundamentally different. Decktopus’new technology was built around one constraint: going off-brand has to be impossible — not just unlikely. 𝙒𝙝𝙖𝙩'𝙨 𝙖𝙘𝙩𝙪𝙖𝙡𝙡𝙮 𝙞𝙣𝙨𝙞𝙙𝙚: · Brand Kit enforcement at generation, no manual formatting ever again · AI auto-classifies 100+ slides by type in minutes · Natural language prompts that edit without violating brand rules · Unlimited per-slide version history, every change recoverable · Multi-brand support, separate kits, fully isolated per client · Slide Library, reuse assets across decks without starting from scratch V2 was a canvas. V3 was smarter. The last version is the modern brand guardrail at 120 mph 𝙏𝙝𝙚 𝙦𝙪𝙚𝙨𝙩𝙞𝙤𝙣 𝙞𝙨𝙣'𝙩 𝙬𝙝𝙚𝙩𝙝𝙚𝙧 𝙮𝙤𝙪𝙧 𝙩𝙚𝙖𝙢 𝙬𝙞𝙡𝙡 𝙪𝙨𝙚 𝘼𝙄 𝙛𝙤𝙧 𝙨𝙡𝙞𝙙𝙚𝙨. 𝙄𝙩'𝙨 𝙬𝙝𝙚𝙩𝙝𝙚𝙧 𝙩𝙝𝙚 𝙤𝙪𝙩𝙥𝙪𝙩 𝙬𝙞𝙡𝙡 𝙚𝙢𝙗𝙖𝙧𝙧𝙖𝙨𝙨 𝙮𝙤𝙪𝙧 𝙗𝙧𝙖𝙣𝙙. Don't trust me, see what your brand looks like: https://lnkd.in/e_E679Mf
-
Marcel Velica ha compartido estoAI is NOT improving your cybersecurity. It’s quietly blinding it. The more you rely on AI summaries… The less you actually see. Most security teams don’t have a detection problem. They have a visibility illusion. AI makes everything look clean. Structured. Under control. But underneath? Signals are getting diluted. Context is getting lost. And attackers are blending in better than ever. Here are 10 hard truths no one talks about: AI summaries hide critical signals → Treat them as a starting point, not reality Anomalies get buried in compression → Prioritize anomaly detection over summaries Attacks happen in sequences, not snapshots → Always reconstruct timelines “Almost normal” is the new attack strategy → Don’t trust historical baselines blindly Clean dashboards create false confidence → Always validate with raw data Threats live across disconnected systems → Correlate across endpoints, identity, network, cloud Normal behavior can be weaponized → Monitor misuse of trusted tools Weak questions = weak security → Always ask: what’s missing? AI is a tool, not a decision-maker → Combine speed with human judgment No raw data = no real visibility → Maintain full traceability AI doesn’t eliminate risk. It reshapes it. And the most dangerous threats today? Don’t look like threats at all. Be honest Have you ever trusted an AI alert… that later turned out to be incomplete? If this changed how you see AI in cybersecurity, repost it to protect someone in your network. Follow Marcel Velica for real-world cybersecurity insights that most people ignore. If you want short daily thoughts, quick threat observations, and real-time discussions, follow me on X as well →https://x.com/MarcelVelica
-
Marcel Velica ha compartido estoAirwallex is about to take on Stripe and the rest of the industry in the physical world. Modern commerce is global, but POS infrastructure is stubbornly local. Every new country usually means a new local acquirer, new terminals, new contracts, and fragmented reporting. Because online and in-store payments run on completely different stacks, loyalty, data, and reconciliation break down between channels. Airwallex spent a decade quietly building global payment rails. That’s nearly 90 regulatory licenses across ~50 markets and direct connections into local networks in 120+ countries. With the official launch of Airwallex POS Payments, those rails are finally coming to the physical countertop. This is not just another feature launch. It is one global stack solving the two biggest payment headaches: For Global Retailers: Get one stack for online and in-store. Deliver a consistent customer experience across borders and a single global ledger for reconciliation. For SaaS and Platforms: Embed white-label in-person payments and SoftPOS into your products. Unlock new monetization via embedded financial services like accounts, payouts, cards and FX. Stop letting legacy infrastructure break your channels.
-
Marcel Velica ha compartido estoTHE 30-DAY CYBERSECURITY ROADMAP (FROM ZERO TO JOB-READY) You don’t need a degree to break into cybersecurity. You need a 30-day plan that actually works. Most beginners stay stuck for months… because they consume content instead of building real skills. This roadmap fixes that. Follow this for 30 days, and you won’t just “learn” cybersecurity you’ll start thinking like a security professional. Week 1 — Foundations → Cybersecurity basics → Threats (phishing, malware, ransomware) → Attacker mindset → Frameworks (NIST, ISO 27001) Week 2 — Real Skills → Incident response (hands-on) → Cyber attacks (SQLi, XSS, DDoS) → Security tools (SIEM, Firewalls) → Risk management Week 3 — Practical Execution → Set up your home lab (Kali Linux) → Log analysis → Defensive skills (access control, policies) → Social engineering simulations Week 4 — Career Mode → Threat modeling → Blogging & personal branding → Security planning → Final cyberattack simulation This roadmap works because it focuses on what most people ignore: Thinking like an attacker Hands-on practice (not just theory) Communication (reports + content) That’s what actually gets you hired. You don’t need 100 courses. You need one focused roadmap + execution. 🔁 Repost this to help someone start cybersecurity ➕ Follow Marcel Velica for more real-world cybersecurity & career growth content If you want short daily thoughts, quick threat observations, and real-time discussions, follow me on X as well →https://x.com/MarcelVelica
-
Marcel Velica ha compartido estoThe Real Cybersecurity Roadmap (That 90% Professionals Ignore) Most cybersecurity professionals will NEVER reach senior level. Not because they lack skills… But because they’re learning the wrong roadmap. If you want to become a high-level cybersecurity professional, you must stop thinking like a technician… …and start thinking like a strategic leader. 1️⃣ Leadership & Strategic Skills • Security Governance & Leadership • Critical Thinking • Storytelling with Data • Stakeholder Communication • Adaptability & Problem Solving • DevSecOps & Encryption • Nation-State & APT Awareness 👉 You guide decisions, not just fix problems. 2️⃣ Advanced Security Architecture • Network Segmentation & Microsegmentation • Supervised & Unsupervised Learning • Model Evaluation (ROC, Confusion Matrix, Cross-validation) 👉 You design systems, not tasks. 3️⃣ Detection & Response • Threat Detection Strategy • SIEM & Analytics (Tableau, Power BI, Looker) 👉 Speed = survival. 4️⃣ Offensive Security Mindset • Advanced Pentesting • Data Transformation & Normalization • Dark Web Intelligence 👉 Think like an attacker. 5️⃣ Cloud & Modern Infrastructure • Cloud-Native Security • NIST & Risk Frameworks • Database Security 👉 Cloud is the new battlefield. 6️⃣ Security Engineering & Automation • Query Optimization • Indexing, Joins, Stored Procedures • Automation & Control Structures 👉 Manual work doesn’t scale. 7️⃣ Data Security & Privacy • Data Classification • DLP (Data Loss Prevention) • Encryption Strategies • Data Analysis & Visualization 👉 Data is your biggest risk. 8️⃣ Core Data & ML Stack • Python (Pandas, NumPy, Matplotlib) • Machine Learning (Scikit-learn, TensorFlow, PyTorch) • Regression & Decision Trees 👉 Security is becoming data-driven. 9️⃣ Security Program & Architecture • Building Security Programs • Designing Enterprise Architecture 👉 This is where you become irreplaceable. Certifications don’t make you senior. Strategic thinking does. Most people chase tools. Top 1% build systems. If this helped you: 🔖 Save this post (you’ll need it later) 🔁 Reshare with someone in cybersecurity 👤 Follow Marcel Velica for more high-level cybersecurity!
-
Marcel Velica ha compartido estoThe 30 Core AI Algorithms Every Professional Should Understand Most people use AI… without understanding what’s actually running behind it. It’s not magic. It’s algorithms. 🔹 Prediction & Classification Linear Regression → Predicts numbers (e.g., house prices) Logistic Regression → Yes/No outcomes (spam detection) Decision Tree → If-else decision making Random Forest → Multiple trees = better accuracy SVM → Finds the best boundary between classes k-NN → Uses nearest data points Naive Bayes → Fast probabilistic classification Gradient Boosting → Learns from mistakes step-by-step AdaBoost → Combines weak models into strong XGBoost → Optimized, high-performance boosting 🔹 Clustering & Simplification k-Means → Groups similar data Hierarchical Clustering → Builds cluster trees DBSCAN → Detects clusters + outliers PCA → Reduces features, keeps important info t-SNE → Visualizes complex data in 2D/3D 🔹 Reinforcement Learning (Decision Making) Q-Learning → Learns best actions via rewards SARSA → Learns based on current actions DQN → Deep learning + Q-learning Policy Gradient → Learns directly from rewards Actor-Critic → Combines strategy + evaluation 🔹 Deep Learning (Neural Networks) ANN → Brain-like learning system CNN → Image recognition & pattern detection RNN → Sequence-based learning LSTM → Remembers long-term patterns Transformer → Powers modern AI (like GPT) 🔹 Advanced & Specialized K-Means++ → Better clustering initialization Autoencoders → Compress & reconstruct data Isolation Forest → Detects anomalies MDP → Decision-making framework Genetic Algorithms → Evolution-based optimization Every AI system you see today… is built on these foundations. Most people chase tools. But tools change fast. Algorithms don’t. If you understand these… you don’t just use AI you understand how it thinks. AI won’t replace you. But someone who understands these algorithms… will. Master the fundamentals once. And you’ll stay ahead for years. Be honest how many of these did you already know? If you want short daily thoughts, quick threat observations, and real-time discussions, follow me on X as well →https://x.com/MarcelVelica
-
Marcel Velica ha compartido estoMost people don’t fail in cybersecurity. They lack direction. I often see professionals jumping between certifications with no clear path. That approach slows growth. Cybersecurity has three core tracks: • Blue Team: defense and monitoring • Red Team: offensive security • InfoSec: risk and governance Each requires a different mindset. Certifications are not the goal. They are only validation. Real progress comes from: • Choosing one path • Building hands-on skills • Staying consistent The roadmap in the image provides clarity. But clarity only works with commitment. If you’re starting out, don’t ask: “Which certification is best?” Ask instead: “What problems do I want to solve every day?” That answer defines your career. Which path are you focusing on? If you want short daily thoughts, quick threat observations, and real-time discussions, follow me on X as well →https://x.com/MarcelVelica
-
Marcel Velica ha compartido estoAI-Augmented vs Autonomous Security: The Gap That’s Putting You at Risk Your security stack isn’t weak… It’s just waiting for a human. That’s the real risk. We’re entering a shift most teams are underestimating: AI-Augmented Security vs 🤖 Autonomous Security Systems And the difference isn’t technical… It’s operational survival. AI that assists still waits. AI that’s autonomous acts. Attackers don’t wait. Why should your defense? AI-Augmented Security • Enriches alerts • Summarizes incidents • Suggests next steps • Keeps humans in control Sounds powerful… but here’s the catch: 👉 It still depends on human speed 👉 It still creates decision bottlenecks 👉 It still leaves gaps during critical moments Autonomous Security Systems • Detect → decide → respond (automatically) • Execute multi-step actions in real-time • Adapt based on context and risk scoring • Operate within defined policy boundaries No waiting. No fatigue. No delay. Most organizations think they’re “AI-enabled” But in reality… They’ve just made their dashboards smarter not their defenses faster. From: ➡️ Human-in-the-loop security To: ➡️ Human-on-the-loop security That’s a completely different game. • Attacks are automated • Dwell time is shrinking • Scale is exploding If your response still requires a human checkpoint… You’re already behind. AI-Augmented Security = Helps you analyze Autonomous Security = Helps you survive Repost if this changed how you think about AI in security Follow Marcel Velica for more real-world cybersecurity insights If you want short daily thoughts, quick threat observations, and real-time discussions, follow me on X as well →https://x.com/MarcelVelica
-
Marcel Velica ha recomendado estoMarcel Velica ha recomendado estoI asked a room of 200 QA leads last month: “If your CEO walked in and asked how much revenue your testing protects this quarter — could you answer?” Only 7 hands went up. Out of two hundred. That silence isn’t about their skills. It’s because most QA teams still speak a language the business doesn’t understand: test cases, bug counts, coverage percentages. Meanwhile, we’ve entered the era of agentic testing. AI agents now explore apps like a curious human, flag risks in plain business terms. Leaders at giants like Microsoft openly call this “the end of script-based QA within 3 years.” But most teams are not ready. Here’s what I’m seeing at SDET Tech across product and engineering clients: Three uncomfortable truths: AI-generated code is now the norm. Over 75% of enterprise code will be AI-generated by 2028. It’s fast but inconsistent — hallucinated libraries, missing error handling, weird flows. Traditional check-the-box testing misses these disasters. Speed rewrites the QA role. When features move from prompt to production in under an hour, QA can’t stay a separate phase. It must become a continuous intelligent layer — or get bypassed completely. Executives now see quality as growth. Downtime, security gaps, accessibility failures aren’t “tech debt” anymore. They’re boardroom risks. Winning teams connect testing directly to retention, revenue, and compliance savings. What teams ahead of the curve do differently: ✅ Business-language observability — dashboards don’t shout “1200 tests passed.” They say “checkout reliability = 99.97% → protects ₹X monthly GMV.” The CEO finally gets it. ✅ Agent-augmented exploration — AI agents navigate your app like a power user at 3am, find real UX and logic cracks, and log them in human language. ✅ Trust engineering — when code is AI-generated, “the AI said so” isn’t a defence. QA becomes the independent validation layer. Confidence, verified. Bluntly: this shift is rewriting careers. QA leads who speak business impact get strategy seats. Those who stick to script counts get managed out. 👉 Quick pulse check: Does your org report testing outcomes in business metrics (revenue risk, trust, compliance) or still in automation percentages? Drop your honest answer. No judgment. #QualityEngineering #AgenticTesting #AITesting #QA #SDETTech
-
Marcel Velica ha recomendado estoMarcel Velica ha recomendado esto⏰ The clock is ticking, and your competitors aren't waiting. Every day you delay adopting AI in your business, someone else is moving faster, serving better, and scaling smarter. The question isn't if AI will transform your industry. It already has. The question is, are you leading that change, or scrambling to catch up? Here's the truth nobody tells you: AI isn't just for tech giants. Small and mid-sized businesses are quietly using AI right now to cut costs, automate the boring stuff, and make smarter decisions, faster than ever before. And it doesn't have to be complicated. What if you could: → Automate tasks eating up your team's time every single day → Get insights from your data that you're currently missing → Build systems that work for you even while you sleep This is exactly what I help businesses with. If you're curious about where AI can actually move the needle in YOUR business, let's talk. I'm offering FREE 10-minute AI consulting calls, no pitch, no fluff, just real clarity on where to start. Drop your email in the comments or DM me directly, and I'll personally reach out to schedule your slot. Spots are limited. Your competition isn't slowing down. Are you? #ArtificialIntelligence #AIForBusiness #DigitalTransformation #AIStrategy #BusinessGrowth #Innovation #AIConsulting #FreeCalling #AIOverlords #Karanonai
-
Marcel Velica ha recomendado estoMarcel Velica ha recomendado estoGrateful to be recognized for Q1 (Jan - Mar) for delivering strong client appreciation and performance, including Top-Box feedbacks. What makes this truly meaningful is the context behind it - consistent effort, continuous learning, and a team that believes in raising the bar together. This recognition may seem like a small win, but I strongly believe small, consistent wins compound into meaningful impact over time. A big thank you to my manager, Monalisa Mishra, for the recognition and constant encouragement. Also grateful to Manager Roopalii Bajaj and my amazing teammates for their guidance, collaboration, and support throughout the quarter. Being part of Tech Mahindra has been a journey of continuous growth - especially getting the opportunity to work with SAP has given me a path of continuous learning and pushing limits every single day. On to the next milestone 🚀 #IamTechM #TechMighty #IamSAPNXT #TechMahindra #SAP #SmallWinsBigImpact
-
Marcel Velica ha recomendado estoMarcel Velica ha recomendado estoIndia’s biggest wealth creation opportunity won’t come from tech this decade ❌ It will come from infrastructure. I see infrastructure and manufacturing as the next major wealth creation engine in India. We are looking at a ₹2.5 trillion infrastructure push. Roads, railways, logistics & urban development are being built at a pace we haven’t seen in decades. Now layer this with the global shift. The China+1 strategy is actively playing out. Global companies are diversifying supply chains & India is emerging as one of the strongest alternatives. Analysts are projecting 14% earnings CAGR for top infrastructure firms till FY27. Every ₹1 invested in infrastructure creates a multiplier effect. Most investors will recognise this story late, when the outcomes are already visible in stock prices and earnings. Smart investors are already positioning. #investors #wealthcreation #infrastructure
-
Marcel Velica ha recomendado estoMarcel Velica ha recomendado estoMost projects emphasize features, but I aimed to focus on how systems think, decide, and improve before going live. For the Meta × Hugging Face × Scaler Hackathon, I developed: Customer Support OpenEnv — my first Open Environment project. What makes this interesting: This system creates a simulation layer where decisions can be tested, validated, and improved in a controlled environment instead of directly handling users. Core Features: - Scenario-based ticket simulations (password reset, account issues, etc.) - Step-by-step execution with validation - Smart action suggestions and next-step guidance - Playbook-based automation flows - Observation logs and decision insights Tech Stack & Concepts: - Frontend: HTML, CSS, JavaScript - Backend: Node.js - Architecture: JSON-driven workflow engine - Concepts: State management, validation pipelines, playbook automation - Tools: Git, GitHub What I learned: Building my first OpenEnv helped me transition from just coding to thinking in systems and understanding how real-world workflows and AI agents are structured. GIT HUB REPO-https://lnkd.in/gK_mGNii Open to feedback and suggestions to improve this further.
-
Marcel Velica ha recomendado estoMarcel Velica ha recomendado estoLet AI handle your Tech. Human Skills Are Premium now. Learn how to Communicate, Negotiate and Lead.
-
Marcel Velica ha recomendado estoMarcel Velica ha recomendado estoOn day 60 of 100 UTI Q4FY26 concall update The Indian mutual fund industry continues to demonstrate structural strength despite global volatility—driven by financialization of savings and resilient retail participation. Industry Snapshot (March 2026): • Total AUM: ₹79.46 lakh crore • Retail AUM: ₹42.89 lakh crore • SIP inflows: ₹32,087 crore/month • SIP AUM: ~₹15 lakh crore (~20% of industry AUM) • Equity inflows: ₹40,450 crore UTI AMC – Strategic Shift to Growth Mode After years of investing in tech, distribution, and workforce restructuring, management’s singular focus is now growth with operating leverage. Digital & Efficiency Gains: • Digital revenue ↑ 234% • Transactions ↑ 33% • Cost/transaction ↓ 31% • 59% inbound calls automated via AI (“Vani”) • First AMC with WhatsApp payment integration Operational Transformation • Employee base reduced: 1,442 → 1,248 • Frontline avg. age: 41 → 36 years • Gen Z workforce: 5% → 38% • Sales efficiency: Supervisor ratio improved from 1:1 → 1:5 This is not cost-cutting—it’s operating leverage being engineered deliberately. Key KPIs (FY26) • Group AUM: ₹23.42 lakh crore • MF AUM: ₹3.88 lakh crore (↑ from ₹3.39 lakh crore) • Market Share: 6.1% (FY26) SIP Engine: • SIP AUM: ₹39,813 crore (+5.9% YoY) • Active SIPs: 29.53 lakh (+9.7% YoY) • FY26 SIP inflows: ₹9,442 crore (+13.4%) • Avg ticket size: ₹3,381 • 76% SIPs sourced digitally Customer Growth: • 7.16 lakh new investors added • Total folios: 1.38 crore Segment Highlights: • Passive AUM: ₹24,897 crore • Pension AUM: ₹4.02 lakh crore (+11.8%, 24.36% market share) • International AUM: $1.74 bn • Alternatives: ₹5,280 crore Financials Standalone: • Core income: ₹1,255 crore • Normalized PAT: ₹643 crore Consolidated: • Core income: ₹1,539 crore • Normalized PAT: ₹511 crore Dividend: ₹40/share (~93–95% payout trend) Management Guidance & Strategy • Prioritizing SIP-led growth over lump-sum volatility • Avoiding active thematic funds; pushing passives for sector exposure • Yield compression of 1–2 bps expected (shift to ETFs/index funds) • Cost base stabilizing: Employee cost: ₹90–95 cr/quarter (standalone) • Continued investments in tech + branch expansion Key Strategic Takeaways Shift from yield optimization → AUM scale play Digital + fintech partnerships = customer acquisition engine SIP book becoming the core moat for stability Balanced strategy (active styles + passive expansion) reduces cyclicality risk Bottom Line: UTI AMC is transitioning from a legacy institution to a digitally-enabled, distribution-driven compounding machine with SIP flows and operating leverage as the primary drivers of the next growth phase.
-
Marcel Velica ha recomendado estoMarcel Velica ha recomendado estoExcited to share my latest project - AttenTrack! As part of my Software Project in Trimester 3 at Christ University, Delhi NCR (MCA), I built AttenTrack - an AI-driven real-time student attention monitoring system. What it does: • Detects eye closure, phone usage & head pose • Calculates live attention score • Sends instant email alerts to parents • Role-based dashboards (Student / Parent / Admin) • Real-time charts, alerts & session analytics Tech Stack: • Frontend: React.js, Chart.js, CSS3 • Backend: FastAPI (Python) • AI / CV: MediaPipe Face Mesh, YOLOv8, OpenCV • Database: MongoDB • Real-time: WebSockets • Auth: SHA-256 hashing, role-based login (Student / Parent / Admin) • Deployment-ready: .env config, CORS, frame-processor API A huge thank you to Prof. Kuljeet Singh Sir for guiding me through the idea and laying out the roadmap for this project. His insight into how the system could be architected from the AI pipeline to the role-based dashboard structure made all the difference. Truly grateful! 🙏 🔗 GitHub: https://lnkd.in/guhEwd2D 🌐 Live: https://lnkd.in/gVKCwc2k 🎥 Demo: https://lnkd.in/gvE6-eXq Would love to hear your thoughts and feedback! 😊 #AttenTrack #MachineLearning #ComputerVision #FastAPI #ReactJS #MediaPipe #YOLOv8 #MCA #ChristUniversity #StudentProject #WebDevelopment #AI #RealTimeAI #OpenCV #MongoDB
-
Marcel Velica ha recomendado estoMarcel Velica ha recomendado estoI used to think a tech pack was just a formality. Then I watched a INR 4L sampling order go wrong because the seam allowance wasn't specified. That one missing line "side seam: ¼ inch", caused a misfit across an entire size run. Now, I treat the tech pack as the single source of truth. Before a single yard of fabric is cut, the document answers every question the factory might have: 1. What is the fabric weight? (120–150 GSM Modal Satin) 2. What's the exact waist for size M? (26.5 inches) 3. How is the halter strap secured? (bar tack) 4. How should the inside seams be finished? (clean overlock) This is what professional merchandising looks like behind the scenes. The glamour is in the gown. The discipline is in the document.
Experiencia y educación
-
Eventbrite
****** ******** ******* *******
-
************* *** ********* *********** ******
*** *********** *** ********
-
********* *************
** ********
Mira la experiencia completa de Marcel
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¡Hola de nuevo!
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
Recomendaciones recibidas
1 persona ha recomendado a Marcel
Unirse para verloVer el perfil completo de Marcel
-
Descubrir a quién conocéis en común
-
Conseguir una presentación
-
Contactar con Marcel directamente
Ver más publicaciones
-
THE DECODER - EVERYTHING AI
3 mil seguidores
1/ A developer tested the OpenClaw platform using the security analysis tool ZeroLeaks, revealing alarming vulnerabilities: the platform scored just 2 out of 100 points, with an 84 percent extraction rate and 91 percent successful injection attacks. 2/ System prompts, tool configurations, and memory files could be extracted with minimal effort, prompting recommendations for users working with Clawdbot to implement basic security measures. 3/ A security researcher uncovered an even more critical flaw in the Moltbook platform: the entire database was left unprotected on the network, exposing secret API keys to potential attackers. More: https://lnkd.in/dWCPXPSq
1
-
The Cyber Security Hub™
2 M seguidores
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
9
1 comentario -
The Cyber Security Hub™
2 M seguidores
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
6
1 comentario -
The Cyber Security Hub™
2 M seguidores
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
3
-
Cybrlytics Technology
10 mil seguidores
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
2
-
Hussar Systems LLC | Palo Alto Networks
41 seguidores
Is your security team drowning in fragmented data from multiple tools while sophisticated attacks exploit the gaps between your security silos? Transform your security operations with Cortex Extended Data Lake—the AI-ready data foundation that unifies all security telemetry into a single source of truth. Move from reactive tool management to proactive, platformized SecOps. • Unify security data from endpoints, network, cloud, and identity sources into a common schema with petabyte-scale architecture that processes over 11PB daily. • Enable true AI-driven security operations with precomputed features, relationship mapping, and behavioral baselines that make data ML-ready. • Deploy new security capabilities instantly through "collect once, analyze infinitely" efficiency—each new module leverages the complete data foundation. • Access over 10,000 pre-built detectors and 2,600 ML models that continuously update, far beyond the 100-200 rules most SOCs manually maintain. • Reduce manual workload by 75% and achieve up to 98% faster MTTR through automated correlation and machine-speed incident response. Stop playing detective across disconnected systems and start operating with unified visibility that transforms how your security team detects, investigates, and responds to threats. Explore Palo Alto Networks Quick Start Service: https://lnkd.in/gcDg3rrf Explore Palo Alto Networks Firewall Managed Service: https://lnkd.in/gTt-RcTB #PaloAltoNetworks #ResourceLibrary #PaloAltoNetworksResourceLibrary #CortexXDL #SecurityOperations #SOC #AISecurity #Platformization #ThreatDetection
-
Cortex by Palo Alto Networks
58 mil seguidores
🛠️ Traditional SIEMs weren’t built for today’s threats. Complexity, poor cloud integration, and high false positives are holding security teams back. It’s time to modernize. This guide gives security leaders a clear roadmap to transform their SIEM without disrupting operations. 🔍 Start your SIEM transformation with Cortex XSIAM. https://bit.ly/3JsfsEz
84
-
Soterics, your end-to-end partner in OT security
2 mil seguidores
"The traditional SOC doesn't really work." From analyst to SOC manager, Amine B. has seen it all. The noise. The fatigue. The model that doesn’t scale. In this podcast, he shares how we’re rethinking the SOC at Soterics: focused on context, clarity, and what truly matters. Want to hear more? Check out the full podcast: https://lnkd.in/efMb65kk Thank you FHI, Federatie van technologiebranches and Joep van Heumen for having us! #otsecurity #operationaltechnology #otsoc #fhi
20
1 comentario -
AI EdgeLabs
1 mil seguidores
🔥 Today AI EdgeLabs introduces the Compliance Center – extending our AI-native runtime platform with real-time compliance and Linux audit capabilities for regulated and distributed environments. What’s included: - A single real-time Risk Score for your security posture - Live NIS2 & CRA visibility mapped to runtime evidence - Linux audit & configuration hardening insights - Prioritized assets based on impact and criticality - Automated incident reporting and response 💣 Built for AI workloads, GPU clusters, edge, hybrid cloud, and sovereign environments, the Compliance Center by AI EdgeLabs delivers audit-ready evidence where cloud-first tools can’t even operate. 👉 Learn more https://lnkd.in/dJ6sY5kp
16
-
CrowdStrike
1 M seguidores
When a cyber incident strikes, the first 48 hours are critical. Every decision shapes your path to recovery. Download CrowdStrike's new response guide to learn: ✅ How to establish secure communications immediately ✅ When and how to activate response teams effectively ✅ Essential steps to contain threats without alerting adversaries ✅ Strategic approaches to recovery and communication Get the 6 step-by-step guide you need to navigate critical decisions with confidence: https://lnkd.in/gdDTjX3A
153
3 comentarios -
Hunt Intelligence, Inc.
5 mil seguidores
📖 If your threat hunting process starts and ends with “check the feed,” you’re missing the bigger picture. Attackers are constantly evolving, reusing SSH keys across campaigns, hiding C2 servers behind redirectors, hosting payloads in open directories. Our ebook Modern Threat Hunting, gives you the insight and methods to spot these behaviors and link them into full infrastructure map. Inside, you’ll find real-world techniques that go beyond theory, from using TLS certificate reuse to spot hidden C2 servers, to fingerprinting phishing kits by their HTTP headers, to discovering malware in exposed directories. This isn’t theory. It’s how professional hunters work every day. 📥 Get the ebook: https://lnkd.in/ddBWFrvr #ThreatHunting #CyberSecurity #ThreatHuntingEbook
3
-
SecComply
2 mil seguidores
Dear CTOs — Security questionnaires aren’t just annoying… they’re slowing your entire product roadmap. If security checklists are stealing your dev team’s focus, it’s not just inefficient — it’s unsustainable. 💡 Learn how a vCISO can help you scale securely, earn trust, and speed up your sales cycle. #CTO #StartupSecurity #vCISO #B2BSaaS #InfoSec #CybersecurityLeadership #SaaSCompliance #ISO27001 #SOC2 #Founders #ProductManagement #SecurityThatScales
13
3 comentarios -
ManageEngine
59 mil seguidores
What if the smartest way to outsmart attackers was to think like one? In our latest podcast, ethical hacker turned cybersecurity leader Bastien Treptel reveals how the attacker’s playbook is rewriting enterprise security. From deepfake-led breaches to AI-driven threat modelling, this episode breaks down how modern hacks actually unfold and how leaders can turn those tactics into intelligent, human-aware defenses. If you're leading security in 2025, this conversation is unmissable. https://zurl.co/aDa8e #cybersecurity #EthicalHacking #cyberattack #AIInSecurity
3
-
A10 Networks, Inc
63 mil seguidores
AI is creating a new security frontier. A10 Networks’ Diptanshu Purwar explains why built-in LLM guardrails aren’t enough, and how an AI firewall can detect and block threats like prompt injection and data exfiltration. Learn about the three challenges security teams will face when AI becomes more deeply embedded in enterprise and service provider operations. https://bit.ly/45I530t
20
-
Oligo Security
11 mil seguidores
Most runtime security tools stop at the workload 🛑 Oligo goes deeper. Initial intrusions often start at the application layer, but other runtime solutions can only detect them once an attacker has already moved within your infrastructure. At Oligo, we deliver full-stack runtime protection across both applications and workloads to catch attacks at the earliest stage: the initial exploit attempt. Discover how Oligo Cloud Application Detection & Response (CADR) delivers more comprehensive runtime security 👇 https://lnkd.in/ev5zmDAs
45
2 comentarios -
TrueFullstaq
7 mil seguidores
Benelux organizations outperform global averages in cloud native security. New Sysdig data reveals the region leads in identity management and automation. Risky user accounts? Nearly zero. GenAI security adoption? Surged 100% in six months. We partnered with Sysdig to bring you the regional breakdown. Download the report: https://lnkd.in/eNN649zR
18
2 comentarios -
Breach Commander | Unified Incident Orchestration
124 seguidores
Great post by Crowdstrike and Tyler Lioi 👇 The first hours of an incident orchestration put things in motion and set the tone. But they can be chaotic even in mature organizations, which speaks to the importance of preparation and governance. Let’s keep up the fight! #IncidentResponse #CrisisManagement #DFIR #Governance — Breach Commander is a unified incident orchestration solution ✨Discover it in 60s - https://lnkd.in/eaCpAi7w
4
1 comentario
Añade nuevas aptitudes con estos cursos
-
1 h 1 m
Agentic AI Human-Agent Collaboration Design Patterns
-
13 min
A Standalone Project: Build a Program to Encrypt and Decrypt Text Messages Using an Encryption Algorithm to Protect Data from Unauthorized Access
-
1 h 23 m
Microsoft Azure: Security Monitoring and Threat Detection