January 15, 2021 11:27 pm

Tag: Security


Top 5 cyber threats CIOs need to be aware of in APAC region

COVID-19 pandemic has significantly impacted the security of businesses and individuals worldwide. CIOs need to be aware of emerging challenges in the APAC region.
Masaaki Moribayashi, Senior Executive Vice President, Services of NTT

NTT plans to invest $2 billion in India for expansion of data centers, networks and solar power projects

Japanese firm NTT said that it plans to invest around $2 billion on the expansion of data centers, networks, and solar power projects in India
Microsoft boosts Office 365 privacy controls

Microsoft boosts Office 365 privacy controls

To strengthen the data privacy practices of businesses, Microsoft has added new features to “Microsoft 365” that include controls to automatically expire or revoke access to encrypted emails and data investigation capabilities.
Sanjay Kaul, Vice President, Sales, Global Service Provider, Cisco

Cisco at the India Mobile Congress 2018: Innovation Takes Center Stage

#CiscoIMC2018: This week I’m excited to be a part of India Mobile Congress, one of the world’s biggest, most prestigious shows on all things mobile and beyond.
technology, e-governance, enterprise IT, startups, telecom, consumer electronics

Digital Trust is gaining significantly in India, says CA Technologies

60 per cent of Indian consumers say they are definitely cautious about sharing personal data over the internet
Searching for convictions in public records requires going to the offices where they are held, which most people do not have the time to do.

Want to know if a person you are dating has any criminal past? Search it like Google at GoLookUp

To make the search for criminal records faster and easier GoLookUp has launched a Conviction search directory for its users
Blockchain, Blockchain Technology, Microsoft, Budget 2018, Security

What is blockchain, should you invest in: Here’s all you need to know

Blockchain is a disruptive technology trend that enables a shared, authentic, decentralized ledger. It is adept for businesses where large amounts of data is transferred, updated and filtered by multiple users.
Grady Summers, Executive Vice President and Chief Technology Officer, FireEye

Cyber Security: Rules of engagement have broadened, says Grady Summers, CTO, FireEye

Initial cybercrime game was primarily espionage – governments and militaries spying on one another. Quickly the game changed a few short years later, when hackers started using Windows NT to carry out cybercrime. And later on it moved to militaries pivot in the mid- 2000s and begin hacking the private sector, a sign that the rules of engagement were starting to broaden.
- Advertisement -SAP Hana