71 search results for "cybersecurity "

How to detect and manage web bots?

What is Bot Traffic? Bot traffic refers to any traffic that doesn’t originate from human users to a website or platform. Although the term ‘bot traffic’ might seem harmful at first, it’s important to ...

Singapore Unicorn Acronis Released The World’s First Complete Cyber Protection Solution, Tailored To Fight Pandemic Cyberthreats And Improve Remote Work

Enabling service providers to cut costs and defend their clients against cyberthreats through AI-powered integration of data protection and cybersecurity – with total Zoom security, COVID-19 URL filte...

3 Prominent Cyber Security Attacks and Ways to Prevent the Next One

Technology is a powerful and useful tool. It’s pretty hard to imagine our lives without it nowadays. Computers are used to enhance work productivity, to socialize and to relax.  The range of applicati...

Enhancing on-premise solutions market in India: ZNet becomes a distributor of Acronis

25% global growth in cyber-attacks shakes the market as remote workers demand protection – ZNet Technologies now offers the full range of Acronis cyber protection solutions ZNet Technologies (http://z...

Over a third of banking malware attacks in 2019 targeted corporate users

In 2019, 773,943 users of Kaspersky solutions were attacked globally by banking Trojans. Out of those, about 35.1% of users belonged to the corporate sector. African countries were also affected – abo...

NASSCOM Community

Emerging Technologies: Leading the Technology IP Creation Bandwagon for India “Emerging Technologies: Leading the Technology IP Creation Bandwagon for India” provides an understanding to a...

Google Cloud introduced new security tools to fight cyber-attacks

Google Drive now has over a billion users. It links seamlessly with Gmail, provides 15 gigabytes of free storage, and features apps like Google Docs and Sheets that are easy to use. Despite having thi...

List of IT & tech events cancelled/postponed/ or going virtual due to coronavirus

One after another, the world’s leading IT and tech events are either getting cancelled, postponed, or being switched to virtual events because of the rapid spread of the coronavirus. Let’s take a look...

How fintech has reshaped the business lending process

Fintech is a short form of financial technology. It’s a wave that has turned the financial industry services on its head. Developments in this space have gathered pace in recent years. PWC predi...

Top 7 serious reasons for data backup in 2020

Most significant and biggest data breaches of the 21st century These events compiled by CSO are based on the risk and damage that breach caused for companies, insurers, or account holders. This retros...

6 cybersecurity policies every business needs to implement

With over 80% of business information stored in the cloud, information security is now a necessity rather than an option. Important and sensitive information needs to be protected using the right secu...

Top 5 hacker vulnerabilities in your systems in 2020- and how to fix them

Your systems could have been breached five years ago, and the hackers may be sitting there stealing your data every day – That’s what happened in the Marriott Hotels security breach, hackers gai...

Page 1 of 6
1 2 3 6
  • 1
  • 2
  • 6