Cybersecurity

Fifty one percent customers switch service providers if their trust is compromised: Microsoft-IDC study

Only 41% of the customers in India trust organizations providing digital services for personal data protection, according to a study sponsored by Microsoft and conducted by IDC. Th...

What is ethical hacking and why your company should use it

In the Age of Information, cybercrime is rife. In fact, malicious hackers are now violating computers or networks at a rate of one attack every 39 seconds. That’s an alarming disco...

Accelerate digital transformation journey at North Asia’s biggest tech event— Cloud Expo Asia Hong Kong

Cloud Expo Asia Hong Kong—North Asia’s biggest and best-attended technology event, is returning this year on May 22-23 at HKCEC, Hong Kong. The two-day event will bring together IT...

Acronis and ZNet Technologies join forces to equip partners with innovative cyber protection solutions

ZNet Technologies will make the wide range of Acronis cyber protection solutions available in the regional Indian markets via its local partners network  ZNet Technologies, India’s...

IBM unveils new solution to secure blockchain and connected infrastructure

IBM’s X-Force Red team has launched a new blockchain testing solution that will help enterprises to securely build, implement, and use blockchain technology and the connected infra...

Microsoft’s Azure Sentinel to provide birds-eye view across entire enterprise

Microsoft is taking enterprise security to a new level with the new cloud-based security information and event management (SIEM) platform called Azure Sentinel. Using the power of ...

Kudelski Group and Pepper IoT join forces to secure IoT devices

Leading digital security firm Kudelski Group is joining hands with Pepper IoT, the well-known IoT service provider, to secure the internet of things (IoT) devices. According to Gar...

Office 365 is now the most effective solution at mitigating phish emails

In 2018, Microsoft has blocked around 5 billion phish emails and protected 7 billion URL clicks by safe links in Office 365. According to the newly released stats, the tech giant d...

Eight robotic monitoring benefits to enhance customer experience

Robotic monitoring and artificial intelligence (AI) are widely used for physical surveillance of security and defence areas, factories, and residential premises. As robots can moni...

Three’s a Crowd: Understaffing, Underinvestment and Human Errors put ICS Security in Key Verticals at Risk – Kaspersky Report

Monitoring and timely responses to incidents on industrial networks should become key IT security priorities, along with educating and arming staff on how to minimize the risks to ...

New vulnerability discovered in the way Android apps use External Storage

Cybersecurity researchers at Check Point Software Technologies have discovered a new flow in the way Android applications use storage resources. Dubbed Man-in-the-Disk, the flow ca...

How enterprises are steering through digital disruption: Highlights from Infosys report

IT Management (79%), Customer Relationship Management (62%) and Business Process Management (60%) are the primary areas where digital technologies are used the most, according to a...

Page 1 of 2
1 2
  • 1
  • 2
Skip to toolbar