Shadow IT Poses Serious Security Challenges
CIOs today are not accounting for how their network is actually accessed. A single user may be logged on through multiple devices: a phone, a tablet, and a laptop. There…
CIOs today are not accounting for how their network is actually accessed. A single user may be logged on through multiple devices: a phone, a tablet, and a laptop. There…
Considering the growing number of advanced cyber attacks, cyber security experts advise CIOs in Asia Pacific to analyse and understand the different phases of a cyber-attack to build better cyber…
Fifty four percent of Indian consumers prefer dealing with human beings over digital channels to solve customer services issues, according to new research from Accenture. The report also found that…
Microsoft is on a mission to empower India through technology, and acknowledges the critical role that technology start-ups can play in achieving this objective. The company is committed to fostering…
Information technology has brought us all kinds of breakthrough products. Think of a GPS device, which lets you smoothly navigate the world or the computers that form the backbone of…
We are all worried about the constantly sophisticating cyber-attacks. But have we ever wondered the language we use the most is the same language that spammers are using! Trend Micro Incorporated released its…
FireEye, a company, which is committed in finding advanced solutions to prevent advanced cyber attacks, recently conducted a campaign, called ‘Data Stealing Campaigns’. We at cioaxis.com spoke to Ankit Anubhav,…
Gartner has highlighted the top 10 Internet of Things (IoT) technologies that should be on every organization’s radar through the next two years. “The IoT demands an extensive range of new…
ESS DISTRIBUTION, announced the latest trends for 2016 revealed by ESET’s Research Laboratories. With the on-going advances in technology and the rapid growth in the number of connected devices to…
RADWARE released their Global Application & Network Security Report 2015-16. The report outlines top-level findings of the Radware industry survey on cyber attacks in the past year and offers best practice advice…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More