The National Health Authority has come out with a draft National Health Data Management Policy which proposes to create a 'digital health id' for all citizens so an individual's personal health...
Sep 08, 2020
Bring your own PC (BYOPC) security will reach mainstream adoption in the next two to five years, while it will take five to 10 years for mainstream adoption of secure access service edge (SASE) to...
Aug 27, 2020
More than 90% of business leaders say cloud is a priority in the COVID-19 shutdown. They are relying more on cloud technologies but are seeing more cybersecurity attacks. Half a year into the...
Aug 21, 2020
Software-defined wide-area networking (SD-WAN) is rapidly replacing the traditional WAN for remote office and branch deployments. SD-WAN was designed to provide a wide range of benefits to support...
Aug 10, 2020
Julius Caesar is a play by William Shakespeare; in it, there is a famous phrase that is often quoted, "Beware of the Ides of March." Apparently, Caesar was warned about the Ides, which falls on March...
Jul 30, 2020
The COVID-19 crisis led countries and organizations to shut down physical offices and move operations online. This was not easy as IT professionals and departments needed to maintain business...
Jul 29, 2020
Risk Management is undergoing an evolution as we respond, reimagine and reform the operating model. At the forefront of enabling the new ways of operating, lie employee safety and ability to provide...
Jul 21, 2020
It took some time but by now, most of us have accepted the new reality, that is, living life with COVID-19. This year’s pandemic has put the entire world to a standstill and forced organizations to...
Jun 17, 2020
Most companies see strong business drivers to adopt IoT as part of a broader digital transformation process, according to Syniverse-Omdia study. Improved efficiency and productivity, improved product...
Jun 02, 2020
While adoption rates for public cloud continue to grow, security is still the number one roadblock, which is understandable considering the volume and variety of threats organizations face today,...
Feb 21, 2020
Vikas Arora has been appointed as the Global SVP for IT & Security at ITWP Group of Companies including Toluna, Harris Interactive and KuRunData. Prior to this, he was VP - Global IT &...
Feb 10, 2020
Modern applications are difficult to secure. Whether they are web or mobile, custom developed or SaaS-based, applications are now scattered across different platforms and frameworks. To accelerate...
Dec 12, 2019
Zscaler, the leader in cloud security, today announced that Zscaler Private Access (ZPA) is the first zero trust architecture to achieve Amazon Web Service (AWS) Security Competency status. The ZPA...
Oct 29, 2019
Akamai, the intelligent edge platform for securing and delivering digital experiences, recently announced enhancements focused on maximizing security, quality, and reliability from the cloud to the...
Oct 16, 2019
Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, recently announced that IndiGo, India’s largest airline, has deployed Fortinet Secure SD-WAN solution across its...
Sep 30, 2019
Internet users in Asia-Pacific want security and privacy guarantees for the Internet of Things (IoT) -- the rapidly expanding network of devices, physical objects, services and applications that...
Sep 30, 2019
Cybersecurity issues are increasingly becoming a concern in merger and acquisition (M&A) deals, shows a new research report. The study conducted by Forescout suggests that IT and business...
Jul 08, 2019
Trend Micro, a global leader in cybersecurity solutions, today announced it has blocked 5 million attempted cyberattacks against IP cameras in just five months. Through its strategic partnership with...
Jun 28, 2019
Leveraging the automation continuum is security and risk management leaders’ latest imperative in creating and preserving value at their organization, according to Gartner. Katell Thielemann,...
Jun 20, 2019
Recently, a new class of Intel CPU vulnerabilities was published by the microchip giant. Known as speculative execution side-channel vulnerabilities, they affect almost every Intel processor produced...
May 29, 2019
It is elections time and there has been huge uproar over the electronic voting machines (EVMs) as opposition accuses the government of manipulation. But that is politics. What cannot be taken lightly...
May 22, 2019
Trend Micro, a global leader in cybersecurity solutions, today announced the availability of the industry’s most complete security from a single solution protecting across cloud and container...
May 16, 2019
Unsecured Internet of Things or IoT devices in the workplace and those used by third parties are causing large scale cyber attacks, disrupting the privacy and security of organizations. But most...
May 09, 2019
IceWarp, an all-in-one email collaboration platform for communication got certified by ISO. Accruing the ISO 27001 Certification has been highly beneficial for IceWarp and will reduce risks and...
Apr 23, 2019
Akamai, the intelligent edge platform for securing and delivering digital experiences, today announced enhancements designed to help businesses accelerate their cloud migration strategy. The new...
Mar 11, 2019
Feb 19, 2019
Sify Technologies, an ICT Solutions and Services leader in India, today announced a partnership with GMO GlobalSign, a leading provider of trusted identity and security solutions and one of the...
Dec 20, 2018
A majority of consumers are willing to walk away from businesses entirely if they suffer a data breach, with retailers most at risk, according to Gemalto. Two-thirds (66%) are unlikely to shop or do...
Dec 13, 2018
Symantec today introduced Industrial Control System Protection (ICSP) Neural, the industry’s first neural network-integrated USB scanning station that helps organizations protect critical...
Dec 07, 2018
Enabling the business outcome in a ‘Real-Time’ enterprise environment is the next challenge for global brands and government agenciesin 2019. Tech companies will need to drive hard to continually...
Nov 30, 2018
Gemalto, the global leader in digital security, is expanding highly efficient IoT connectivity with the launch of its Cinterion Narrowband IoT (NB-IoT) wireless module platform. The new solution...
Nov 26, 2018
A new global research report by Barracuda Networks, “Security, Connectivity, and Control: The Challenges and Opportunities of SD-WAN” surveyed IT leaders and networking and security professionals to...
Oct 29, 2018
APAC is ahead of the US and EMEA in terms of automation for processes involved in the management of firewall rules and security policy, according to the results of a global survey conducted by...
Oct 29, 2018
Asia/Pacific excluding Japan (APeJ) spending on security related hardware, software and services will reach USD 28.76 billion in 2022 with a compound annual growth rate (CAGR) of 20.7% over the...
Oct 26, 2018
Account takeover (ATO) attacks, in which a person's credentials are stolen and used to send emails from their real account, have multiple objectives. Some attackers try to use the hacked email...
Oct 09, 2018
After documenting improvements in Payment Card Industry Data Security Standard (PCI DSS) compliance over the past six years (2010 – 2016), Verizon’s 2018 Payment Security Report (PSR) now reveals a...
Sep 27, 2018
Many network security threats today go uninvestigated, with IT professionals struggling to accurately prioritize alerts due to the overwhelming volume generated in an increasingly cloud-reliant work...
Sep 26, 2018
ManageEngine, the real-time IT management company, announced its launch of Browser Security Plus, a browser management solution that helps organizations secure their corporate data in the cloud and...
Sep 21, 2018
According to the Akamai 2018 State of the Internet/Security Credential Stuffing Attacks report, worldwide malicious login attempts are on the rise. Findings from the report show that Akamai detected...
Sep 20, 2018
Indian consumers are more likely to trade off on app security for convenience, according to a study commissioned by F5 Networks ‘The Curve of Convenience – the trade-off between security and...
Sep 19, 2018
Rather than looking at the overwhelming and ever-increasing number of threats, your focus should be on identifying those that pose a real risk to your business and knowing the right patching and...
Sep 07, 2018
Axis Communications, the market leader in network video, at Axis Solutions Day 2018, shared implementation details of their large-scale community CCTV Nenu Saitham project in Hyderabad City. The...
Aug 28, 2018
Dish TV India Limited, world’s largest single country DTH Company, has achieved the ISO 27001 Certification, the international standard that sets out and describes requirements and best practices for...
Jun 20, 2018
In the last 3-4 years, several surveys have concluded that skills shortage is one of the top challenges for the enterprise community. Almost all major conferences have devoted hours of planned—and...
Jun 01, 2018
The General Data Protection Regulation (GDPR) designed to give citizens in the European Union (EU) more rights to control their personal information also applies to an Indian entity if it monitors...
May 28, 2018
MediaTek announced its collaboration with Microsoft to deliver the first ever Azure Sphere chip, the MT3620 that will drive IoT innovation with built-in security and connectivity. Azure Sphere is a...
Apr 17, 2018
Poor visibility is one of the greatest challenges to cloud adoption in an organization, according to McAfee’s Navigating a Cloudy Sky: Practical Guidance and the State of Cloud Security report....
Apr 16, 2018
Fortinet has said that the general lack of cybersecurity safeguards in fintech companies has raised serious concerns around data protection and compliance, especially with the implementation of...
Apr 11, 2018
Although enterprises in the Asia-Pacific and Japan (APJ) region are more bullish on adopting Artificial Intelligence (AI) in the Cloud when compared to their global counterparts, they are behind the...
Mar 29, 2018
A new report by Morphisec, a cybersecurity startup from Israel, has discovered that a stealth attack technique dubbed CIGslip that could be exploited by attackers to bypass MS Code Integrity Guard...
Mar 20, 2018