Skip to main content
  • Home
  • Contact
  • Newsletter
  • Login
Home Home

Search form

  • Украина #151522711 , Premium женские кроссовки threat adidas samba white / black gum — цена 2550 грн в каталоге Кроссовки ✓ Купить женские вещи по доступной цене на Шафе , threat adidas b37093 boots
  • Golfsko Jordan 4 G Vit
  • loud lime green jordans , Украина #177083581 , Nike kiss my airs сумка для обуви мешок рюкзак для кроссовок — цена 320 грн в каталоге Рюкзаки ✓ Купить аксессуары по доступной цене на Шафе
  • Zendaya on 'Challengers' Movie Sex Scenes , Cheap Novogas Jordan Outlet
  • Drake's Never - Seen OVO x Nike Air Jordan 1 Not For Resale Sneakers - Nike Air Jordan 1 Not For Resale - Before
  • Insights
  • CASE STUDIES
  • Viewpoints
  • Products
  • Conferences
  • Slideshow
  • Videos
  • Contact us
Home Home

Search form

    • Insights
    • CASE STUDIES
    • Viewpoints
    • Products
    • Conferences
    • Slideshow
    • Videos
    • Contact us

How to Protect Information Assets with DLP

Consider the number of data breaches happening on a daily basis--both inadvertent and deliberate. Many a times, a mail is sent off to an incorrect id-- a genuine human error! What if the mail had confidential information? What happens when a laptop is lost or an old hard disk is disposed of? What happens when a resigned employee wants to take away his hard work while leaving the company, which... By varun gupta

New Investments on New Security Defences to Counter APTs

Enterprise efforts in curbing high-priority threats are insufficient as security researchers continue to find successful APT campaigns inside corporate networks. According to a Trend Micro-sponsored Enterprise Strategy Group (ESG) study, nearly 40 per cent of large organisations invested in new security defenses to respond to APTs. "There is a discrepancy between how enterprises perceive... By varun gupta

Top 5 Mistakes when Embracing the Cloud

This year, cloud computing is definitely poised to gain importance among enterprises. CIOs are now convinced that when properly implemented, cloud computing can dramatically improve a firm's agility and productivity while cutting infrastructure cost. Companies large and small will move significant parts of their operations to the cloud in the next one to two years. Yet while every organisation... By varun gupta

Tame the Tiger in Your Network

We have created a world of users that expect to gain access across a range of devices and network connections instantly. Remote working blurs the line between the workplace and home life with access anytime from anywhere being expected. Access to everything, by everyone, from everywhere all of it securely? In a world that demands a secure business-computing environment but insists on ubiquitous... By varun gupta

Focus on Continuous IT Cost Optimisation: Gartner

After years of tactical cost-cutting, many organisations now face the challenge of continuous IT cost optimisation after the realisation that optimisation practices are never finished, according to Gartner, Inc. According to a worldwide survey of 2,053 CIOs, 65 per cent of those surveyed stated that the main barrier preventing organisations from achieving continuous optimisation of IT costs was... By varun gupta
News

New Technologies Map Human and Machines Relationships

The evolving relationship between humans and machines is the key theme of Gartner, Inc.'s "Hype Cycle for Emerging Technologies, 2013." Gartner has chosen to feature the relationship between humans and machines due to the increased hype around smart machines, cognitive computing and the Internet of Things. Analysts believe that the relationship is being redefined through emerging technologies,... By varun gupta

QR Code, the newest way to leak information

QR codes have a huge curiosity factor, Quriosity. Its a wonderful thing. Tie curiosity to advertising and youve got a winner. QR codes can do just that and much more, which is why their popularity is soaring. Each unique square symbol is comprised of black and white markings and can be scanned by many camera phones or other digital readers to provide information, or, in many cases, a link to a... By varun gupta

5 Points to Consider before choosing a Security SaaS Solution

The Security SaaS model is generally well suited for businesses that either have few IT resources or none at all in-house, no desire to invest in security hardware, little time for managing security or a large number of remote users. In other words, this model serves a broad spectrum all the way from small and medium businesses (SMBs), which fall into the first category outlined above to large... By varun gupta
PERSONAL DEVELOPMENT

How are IT managers coping with todays fast changing threat landscape?

Information Security Solutions provider Websense says theres so much to consider: the rising tide of targeted data-stealing attacks and advanced persistent threats (APTs); the evolution of the cybercriminal; the proliferation and loss of IT control over mobile device usage; the dual edge of productivity and increased risk of social networks . Considering all that, are IT managers ahead of the... By varun gupta

New Opportunities for Consumer Security Providers with BYOD

Consumer adoption and willingness to pay for antivirus software on mobile devices is low, according to Gartner, Inc. Gartner believes that high consumer use of personal mobile devices for work purposes means security providers have an opportunity to assist enterprise bring your own device (BYOD) initiatives. "The use of personal devices at work matches high-enterprise demand for solutions to the... By varun gupta

Armed with IT

Organisational agility is a term that we have all encountered in our career. But what is the relationship between information technology (IT), organisational agility and crisis management? The answers are not far to seek. Information, unfortunately, is not just overflowing but also going viral, thanks to the power of the IT. Information is a double-edged sword that while empowering has also... By varun gupta

Business Centric SLAs are triggering Managed Services Adoption: IDC

Challenging macroeconomic conditions have encouraged organizations to change the way they look at outsourcing. The fact that managed services posted much stronger growth than IS outsourcing supports IDC's assertion that smaller, discrete outsourcing contracts are proving to be far more popular than large, holistic outsourcing contracts. IDC recently concluded a survey on Managed Services in... By varun gupta
  • ‹ previous
  • …
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • …
  • next ›

Search form

MAGAZINE

IT Next_March-April_2024 (1).pdf

Most Popular

CSO Forum Mid-Year Summit

Aug 05, 2014
Will RBI’s Regulatory Sandbox framework catalyze innovation in financial sector? - CIO&Leader

Will RBI’s Regulatory Sandbox framework catalyze innovation in financial sector?

Apr 24, 2019

JUST IN

From UPI to DPI: India's emergence as a global digital influencer

G20 presidency has provided India with just the right opportunity to showcase its success in driving economic growth through digitalization. But it is doing that responsibly, taking an inclusive...
Sep 07, 2023
9,357
0

Recent Content

Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma

JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker

AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation

ITNext
X
IT NEXT
  • Build-to-Suit Data Centres: The Best Answer to Your Data Centre Dilemma
  • JUST CORSECA Launches Two ANC TWS - Soundwave and Skybeats alongside Albatross a portable power packed 20W Bluetooth Speaker
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • Trend: Generative AI ++
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
CIO-LEADER
  • Hexaware Launches Amaze® for Modernization in AWS Marketplace
  • Self-training software in AI-driven visual inspection process is a powerful game-changer
  • Kyndryl to Rev Mainframe App Modernization for Customers with AWS
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Badar Afaq Starts A New Position As Group Head IT At KCT Group
MORE STORIES FROM CIO&LEADER
CSOForum
  • AI in Cybersecurity, Friend or Foe? A CXO's Guide to Responsible Implementation
  • IT Security and Data Protection Experts Introduce New Zero Trust Data Resilience Model
  • Embracing Innovation in Cybersecurity: A 2023 Outlook on Combatting Digital Threats
  • Cisco Unveils Business Performance Insight and Modern App Visibility on AWS
  • AI & its Implications on Information Security
image
  • ABOUT US
  • 9.9GROUP
  • CONTACT US
  • TERMS
  • SITE FEEDBACK

LET US CONNECT

Copyright © 2019-20 9.9 Group Pvt. Ltd.

All Rights Reserved.

Get Newsletter

Stay informed on our latest news!

CAPTCHA

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

4 + 15 =

Get Magazine