Advertisement

Could blockchain be the serendipitous panacea to COVID-19 pandemic?

By Mohua Sengupta In November 2018, purely out of my keen interest in Blockchain and a little influence from my daughter’s MUN (Model United Nations)...

Cyber security in the time of coronavirus crisis

By John Coletti & Aaron Aanenson With the ongoing spread of coronavirus, government guidance is changing rapidly. In many countries, healthy individuals are being asked for...

Don’t panic: COVID-19 cyber threats

By Ryan Olson When people ask me what Unit 42 does, the most concise answer I can normally give is “we research bad guys doing...

Cybersecurity amdist COVID-19 lockdown: Keys to embracing a secure remote workforce

By Michael Sentonas Today’s declaration of a global pandemic by the World Health Organization underscores what we are all coming to realize: that the Covid-19...

What you need to know about DDoS weapons today

By Ahmad Nassiri A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to target...

Explore endless possibilities with serverless software development

By Milind Borate While there are many benefits of public cloud, metered billing is one of the key ones. It’s just like electricity; the meter...

An effective DDoS protection strategy: The only way forward to a safer network

Network and cloud security solutions and software tools are considered to be critical and valuable contributors to the success of an organization. As per IDC’s...

Why is Data Encryption important?

By: Zakir Hussain – Director, BD Soft India Whether on your computer, a flash drive, on a cloud, or includes your entire disc, proper data...

Six cybersecurity controls to bridge the cyber exposure gap in your IT/OT environment

By Diwakar Dayal The proliferation of digital transformation in India’s booming industrial sector is driving the convergence between Information Technology (IT) and Operational Technology (OT)...

3 data protection tips for banking and financial services

By Filip Cotfas Banking and financial services collect and process huge amounts of sensitive data on a daily basis, making them prime targets for cybercrime...
- Advertisement -

Follow Us

6,208FansLike
242FollowersFollow
488FollowersFollow
101SubscribersSubscribe

Latest article

Team Computers launches global delivery center in Uttarakhand to transform rural India

Team Computers, has taken a transformative step in bridging the gap between rural talent and the tech industry with the launch of its Global...

Team Computers and Apple collaborate to empower GCCs with smarter workplace solutions

Team Computers, in collaboration with Apple, hosted an insightful event in Bengaluru on the theme “Empowering GCCs with Team Computers and Apple." The session...

RUCKUS Wi-Fi 6 solution improves campus experience for Amrita University

CommScope announces RUCKUS Networks has helped a higher learning institution, Amrita Vishwa Vidyapeetham (Amrita University), upgrade network connectivity for its Amritapuri and Bengaluru campuses...
- Advertisement -