Skip to main content
  • Home
  • Contact
  • Newsletter
  • Login
Home Home

Search form

  • Adidas Adidas Sports Resort Club Sweater , Украина #174050986 , Футболные шорты adidas real madrid🔥 — цена 350 грн в каталоге Спортивные шорты ✓ Купить мужские вещи по доступной цене на Шафе
  • NIKE AIR JORDAN 1 RETRO HIGH SEASON OF HER SILT RED W 22cm , Cheap Fenua-environnement Jordan Outlet , nike wmns nsw essntl ss top bf archaeo brown white moradas y blancas Quest 6 de Nike Running
  • Украина #70683641 , gray nike roshe flyknit sneakers , Кроссовки nike vista lite barely volt white бело бирюзовые — цена 1990 грн в каталоге Кроссовки ✓ Купить женские вещи по доступной цене на Шафе
  • Набор спортивных бутылок для воды 3 в 1 обьемом 300мл 900 мл 2 л (52303) _ttar — цена 378 грн в каталоге Бутылки ✓ Купить товары для дома и быта по доступной цене на Шафе , Украина #179557101
  • SchaferandweinerShops Switzerland - Jacket with detachable belt bag ADIDAS by Stella McCartney - adidas Originals 2256
  • Insights
  • CASE STUDIES
  • Viewpoints
  • Products
  • Conferences
  • Slideshow
  • Videos
  • Contact us
Home Home

Search form

    • Insights
    • CASE STUDIES
    • Viewpoints
    • Products
    • Conferences
    • Slideshow
    • Videos
    • Contact us

Cyber security: Are you insured?

Cyber security was first recognized as a major global risk by World Economic Forum in its annual Global Risk Report in 2012. Since then, every year, cyber security threats—large scale cyber attacks or massive incidents of data theft/fraud—have been identified as most likely global risks by WEF. In this year’s report, cyber attacks are rated high on both on their impact and likelihood. In short,... By

Cloud Containers for IoT Applications

Latest forecasts by Gartner, Inc. states that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new things will get connected every day. With the rapid growth of Internet of Things (IoT) applications, enterprises look to platforms and services that enables them to manage and analyse the real-time... By Pankaj Nath

Email still significant channel for malicious attacks: Forcepoint Report

Email is still the initial entry point into an organization for targeted attacks, the email-attack vector delivered malicious payloads to organizations in 2015, with a focus on Office documents and zip files, says recently released 2016 Global Threat Report published by security vendor Forcepoint Security Labs. The report says Forcepoint found a 250% increase in malicious content in email in... By CIO&Leader

BI tools on top of marketers' 2016 martech shopping list

Business Intelligence (BI) tools are on top of the martech shopping list of C level executives in marketing this year. According to C-Level 216 Marketing Study published by customer analytics platform provider Black Ink. As many as 60% of the respondents listed BI tools as one of the top three martech tools to be purchased in 2016, while 57% each said marketing automation/campaign tools and... By CIO&Leader

Threats became more sophisticated in 2015: Symantec Internet Threat Report

Like physical security threats, Internet security threats are getting more serious, even as the mechanisms to fight them are getting better. But as older types of threats are beginning to be tackled effectively, newer threats—more sophisticated and targeted at newer frontiers in digital space, such as mobile—are emerging and growing rapidly, according to the findings of the latest Internet... By CIO&Leader
Insights

Corporate E-mail Hacking: A Big Challenge for Information Security

  Email correspondence is second nature in today’s digital world because of all the inherent advantages it affords. The foremost among them - it provides a dated written record which can be easily located and reviewed whenever required, it can be sent in mid of the night and the recipient can go through it once she/he feel comfortable to check the mailbox. The most exciting things about e-... By Tarun Wig

Managing Contractors: Best Practices for Effectiveness

  The corporate world turned to the use of contractors in order to bridge the skill gap when it came to needing personnel for ‘non-core’ ‘short duration’ activities which did not merit investment in nurturing permanent careers. Today contractors are a key part of the work force and represent scalable and often dispensable personnel to overcome a peak in demand or a need for niche services... By Satish Janardhanan

90% of the organizations have a high or medium degree of cybersecurity vulnerability: Study

As much as 90% of the respondents have a high or medium degree of vulnerability to cyber attacks, finds a new study released by Tanium and NASDAQ. The study, called The Accountability Gap: Cybersecurity & Building a Culture of Responsibility, was based on a survey of 1530 respondents across eight countries and sought to identify and understand where the gaps exist across all organizational... By CSO Forum

 

 

'Downtime more damaging than ransom in a ransomware attack'

The biggest cost to businesses suffering from ransomware attacks is not the ransom but the downtime, says a new study commissioned by Intermedia. Employee downtime lasts for days and while prevention is important, businesses need tools to avoid downtime when such attacks occur, the study further concludes. The study, carried out by Researchscape among 275 IT experts across managed service... By CIO&Leader

Dell Survey Shows Basic Data Security Concerns Remain

Six out of ten respondents (58%) in a recent study said they are more concerned about uploading critical data to the cloud now, as compared to a year back. The same survey also reveals that about 82% of decision makers have attempted to limit data access points to enhance security and only 18% are fully confident that their data is secure when employees access it remotely.   This... By CIO&Leader

Global Connected Retail Market to top $50 billion by 2022

The global connected retail market size is expected to reach USD 53.75 billion by 2022 according to a new report by Grand View Research.  Asia Pacific is estimated to be the most flourishing regional market growing at CAGR of nearly 25% between 2012 and 2022. “Developing countries in Asia Pacific including China and India are anticipated to witness considerable growth owing to the... By CIO&Leader

To be or not to be in Cloud (Nine)…

  Myriad discussions on embracing cloud technologies by all types of organizations irrespective of size have been in the air since longtime with lots of views pouring like torrential rains highlighting the pros and cons.  Many organizations have already assimilated the cloud technologies to forge the organization forward with the CTO/CIOs sitting the driver’s seat with an objective to... By Muralidhar Ayyagari
  • ‹ previous
  • …
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • …
  • next ›

Search form

MAGAZINE

IT Next_March-April_2024 (1).pdf

Most Popular

CIO responsible for driving digital transformation, say most CEOs in a BT-EIU Survey - CIO&Leader

CIO responsible for driving digital transformation, say most CEOs in a BT-EIU Survey

Sep 12, 2017

9 Flight APIs You Can Create Apps on to Get Live Flight Data

May 15, 2015

JUST IN

From UPI to DPI: India's emergence as a global digital influencer

G20 presidency has provided India with just the right opportunity to showcase its success in driving economic growth through digitalization. But it is doing that responsibly, taking an inclusive...
Sep 07, 2023
9,419
0

Recent Content

Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma

JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker

AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation

ITNext
X
IT NEXT
  • Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma
  • JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • Trend: Generative AI ++
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
CIO-LEADER
  • Hexaware Launches Amaze® for Modernization in AWS Marketplace
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
  • Kyndryl to Rev Mainframe App Modernization for Customers with AWS
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Badar Afaq Starts A New Position As Group Head IT At KCT Group
MORE STORIES FROM CIO&LEADER
CSOForum
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Embracing Innovation in Cybersecurity: A 2023 Outlook on Combatting Digital Threats
  • Cisco Unveils Business Performance Insight and Modern App Visibility on AWS
  • AI & its Implications on Information Security
image
  • ABOUT US
  • 9.9GROUP
  • CONTACT US
  • TERMS
  • SITE FEEDBACK

LET US CONNECT

Copyright © 2019-20 9.9 Group Pvt. Ltd.

All Rights Reserved.

Get Newsletter

Stay informed on our latest news!

CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

1 + 0 =

Get Magazine