Skip to main content
  • Home
  • Contact
  • Newsletter
  • Login
Home Home

Search form

  • Blazers Center Getting Major Trade Interest From Warriors: Report
  • una Jordan auténtica
  • Red ADIDAS Originals x Thebe Magugu ADIDAS Originals - SchaferandweinerShops Italy - adidas deconstructed tracksuit dress code boys
  • Air Jordan 1 Centre Court Olive
  • nike lunar gato 2 hyper blue volt , Украина #179264456 , Снижка! футбольные бутсы nike air zoom mercurial 43 + подарок — цена 2100 грн в каталоге Бутсы ✓ Купить мужские вещи по доступной цене на Шафе
  • Insights
  • CASE STUDIES
  • Viewpoints
  • Products
  • Conferences
  • Slideshow
  • Videos
  • Contact us
Home Home

Search form

    • Insights
    • CASE STUDIES
    • Viewpoints
    • Products
    • Conferences
    • Slideshow
    • Videos
    • Contact us

Integration & Compliance: Top Challenges for CISOs - ITNEXT Viewpoints

Integration & Compliance: Top Challenges for CISOs

According to the World Economic Forum’s Global Risk Landscape 2018, part of its Global Risk Report (GRR) 2018, both cyber-attacks and data theft are two of the topmost risks to the world we are living in, ranking next only to extreme weather events and natural disasters in terms of likelihood. Cyber-attacks are also the 4th most impactful risk. That pretty well explains why organizations are... By Shyamanuja Das
Which security path do you want to choose? - ITNEXT EDITOR SPEAK

Which security path do you want to choose?

That integration of multiple security solutions and compliance have emerged as the top two challenges in our security survey should come as not much of a surprise to those tuned in. But even to the practitioners it may look a little surprising that six out of ten security leaders now report outside of IT organization. A small part of that—like banking and insurance—may be driven by specific... By Shyamanuja Das
How likely are you to be hacked? - CIO&Leader Insights

How likely are you to be hacked?

Data breaches continue to be a threat to enterprises and consumers. In 2016, 3.2 million credit card and debit card details were stolen by Chinese hackers. The Food and Civil Supplies Department of Chandigarh had reportedly published Aadhaar numbers of their public distribution system beneficiaries in April last year. A couple and one month later, the Jharkhand Directorate of Social Security... By ITNEXT
A cloud compliance crisis - CIO&Leader

A cloud compliance crisis

Almost every enterprise is using the cloud in some way, whether for infrastructure services, or to provide software-as-a-service applications to users. For some time, confidence has been growing in the cloud’s role in IT infrastructure, to the point that we are hearing increasing talk of serverless computing – where a company places its entire infrastructure in the cloud, which dynamically... By Mark Hickman
Now a new wave of Ransomware in India? - ITNEXT Insights

Now a new wave of Ransomware in India?

Last year WannaCry created havoc across the globe and due to its lateral movement; it had penetrated into the networks and skipped across the countries and continents. Furthermore, the security community has been highly proactive in taking down the infrastructure associated with WannaCry, however, due to its ability to move across networks, eScan observes that it still exists in its... By ITNEXT
Majority of Asia/Pacific organizations struggle to cross the cloud maturity chasm and gain agility: IDC - CIO&Leader

Majority of Asia/Pacific organizations struggle to cross the cloud maturity chasm and gain agility: IDC

According to IDC Asia/Pacific’s latest study titled IDC MaturityScape Benchmark: Cloud in Asia/Pacific (excluding Japan), 2018,  more than 85% of the Asia/Pacific organizations are still in the early stages of maturity, which in IDC MaturityScape’s model are referred to as ad hoc and opportunistic stages. Compared to the previous Cloud MaturityScape benchmark study in 2016, over 20% of... By CIO&Leader
NTT Communications subsidiary, Netmagic launches two new datacenters in India - CIO&Leader

NTT Communications subsidiary, Netmagic launches two new datacenters in India

NTT Communications Corporation (NTT Com), the ICT solutions and international communications business within the NTT Group, announced the launch of two new high-density and hyperscale datacenters in Mumbai and Bangalore, through Netmagic, a subsidiary of NTT Com and one of the leading managed hosting and multi-cloud hybrid IT solution providers. Mumbai’s datacenter (DC 6) will offer 7,900 m2 of... By CIO&Leader
Six barriers to digital business: Gartner - CIO&Leader

Six barriers to digital business: Gartner

As organizations continue to embrace digital transformation, they are finding that digital business is not as simple as buying the latest technology — it requires significant changes to culture and systems. According to Gartner, only a small number of organizations have been able to successfully scale their digital initiatives beyond the experimentation and piloting stages. “The reality is... By CIO&Leader
Simplifying multicloud security with managed services - ITNEXT Viewpoints

Simplifying multicloud security with managed services

Enterprise IT has evolved dramatically over the last few years. Customer engagement and inter-connectivity are at the centre of every business application today, and cloud based applications have become the new normal. With more and more organizations now adopting multi cloud environments, security challenges have become even more complicated. While multi clouds offer unmatched flexibility in... By Nitin Mishra
C-suite perspectives on trends in the cyberattack landscape, security threats and business impacts - ITNEXT Viewpoints

C-suite perspectives on trends in the cyberattack landscape, security threats and business impacts

C-suite executives understand that to transform their businesses, they must embrace the integration of new technologies. Most rank improvement of information security and business efficiency as their main goals. Globally, executives indicate they are ready to embrace automated processes as part of their security protocols. Securing Networks is Critical to Protecting Brand Reputations Executives... By Nikhil Taneja
Majority of businesses don't carry out data handling in adherence to data protection laws: Study - CIO&Leader

Majority of businesses don't carry out data handling in adherence to data protection laws: Study

Two in three companies (65%) are unable to analyze all the data they collect and only half (54%) of companies know where all of their sensitive data is stored, according to findings from a recent Gemalto global study. Adding onto it, more than two thirds of organizations (68%) admit they don’t carry out all the procedures in line with data protection laws such as GDPR.  These are just some... By CIO&Leader
Broadcom to acquire CA Technologies - CIO&Leader

Broadcom to acquire CA Technologies

Broadcom, a leading semiconductor device supplier to the wired, wireless, enterprise storage, and industrial end markets, and CA Technologies, one of the world’s leading providers of information technology (IT) management software and solutions, announced that the companies have entered into a definitive agreement under which Broadcom has agreed to acquire CA to build one of the world’s leading... By CIO&Leader
  • ‹ previous
  • …
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • …
  • next ›

Search form

MAGAZINE

IT Next_March-April_2024 (1).pdf

Most Popular

Can lawyers be automated? - CIO&Leader

Can lawyers be automated?

Apr 20, 2020
Will RBI’s Regulatory Sandbox framework catalyze innovation in financial sector? - CIO&Leader

Will RBI’s Regulatory Sandbox framework catalyze innovation in financial sector?

Apr 24, 2019

JUST IN

From UPI to DPI: India's emergence as a global digital influencer

G20 presidency has provided India with just the right opportunity to showcase its success in driving economic growth through digitalization. But it is doing that responsibly, taking an inclusive...
Sep 07, 2023
9,378
0

Recent Content

Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma

JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker

AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation

ITNext
X
IT NEXT
  • Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma
  • JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • Trend: Generative AI ++
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
CIO-LEADER
  • Hexaware Launches Amaze® for Modernization in AWS Marketplace
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
  • Kyndryl to Rev Mainframe App Modernization for Customers with AWS
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Badar Afaq Starts A New Position As Group Head IT At KCT Group
MORE STORIES FROM CIO&LEADER
CSOForum
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Embracing Innovation in Cybersecurity: A 2023 Outlook on Combatting Digital Threats
  • Cisco Unveils Business Performance Insight and Modern App Visibility on AWS
  • AI & its Implications on Information Security
image
  • ABOUT US
  • 9.9GROUP
  • CONTACT US
  • TERMS
  • SITE FEEDBACK

LET US CONNECT

Copyright © 2019-20 9.9 Group Pvt. Ltd.

All Rights Reserved.

Get Newsletter

Stay informed on our latest news!

CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

6 + 2 =

Get Magazine