Control Sensitive Data Transfer at End Points, Even When Offline!
Data is the most treasured resource of any organization in today’s world. This makes it imperative for any company to invest in proper security measures and not grant an open…
Data is the most treasured resource of any organization in today’s world. This makes it imperative for any company to invest in proper security measures and not grant an open…
Written by Harikrishna Prabhu, COO, TechnoBind Solutions What are the old and new technologies that the cybersecurity vertical will depend on? How much data is being generated by the world…
By Ranga Shetty, General Manager, Granicus India The govtech boom is upon us, as governments around the world recognize the potential of technology to improve the efficiency and effectiveness of…
By Kumar Gaurav Gupta, VP & Country Manager – Indian subcontinent, SAP Concur For employees, it’s not only the workload that creates pressure. Having technological challenges, introducing unnecessary processes,and having…
Further to Finance Minister Nirmala Sitharaman’s Union Budget 2023 announcement, below is Post Budget quote from Vishal Agrawal, MD, Avaya. “We appreciate the government’s continuous focus on the technology sector…
Owing to the number of breaches that are on the rise, on this data privacy day, there is a serious need for individuals and organizations to be alert and aware…
By Douglas McKee Late last year, the Trellix Advanced Research Center team uncovered a vulnerability in Python’s tarfile module. As we dug in, we realized this was CVE-2007-4559 – a…
In an interaction with CIO AXIS, Sudhindra Holla, Director, Axis Communications, India and SAARC, and Sandesh Kaup, Country Manager, Milestone Systems, India and SAARC, share their thoughts and insights on…
After his education in information technology, Alberto Giorgio served as an international IT consultant for companies including Oracle, Vodafone, Fastweb, Avea, Intesa San Paolo, Unicredit, Banca Sella, Lombardia Informatica and…
By Curtis Preston, Chief Technical Evangelist, Druva Cybersecurity is experiencing a fierce conflict between hackers and security experts as a result of the exponential growth in technology. On the other…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More