Blogs
Stay updated with the latest articles on technology, security, and digital transformation—designed to inform and inspire your business growth.
-
Increasing cyber attacks calls for increased security audits within IT companies
Indian IT companies did not give high priority to cyber security but...
-
HDB Financial emerges stronger with Advanced Email Security & Data loss prevention
HDB Financial Services Limited is a leading non-banking financial company, provides...
-
RBI declares localisation of Payment Data Storage
The Reserve Bank of India (RBI) on Wednesday declared that all data...
-
Analyzing World’s Top Cybersecurity breaches of 2019, so far
How safe is your organization? Data breaches are happening more often than...
-
DCB Bank moves to Logix for Email Security
DCB Bank Limited is an eminent private sector scheduled commercial bank in...
-
Whatsapp to take legal Action against App Misusers and Spammers
Whatsapp has announced that it will take legal action against individual and...
-
Blog 15 May 2018 Cryptojacking Attack hits Aditya Birla Group -
Blog 11 May 2018 ODNS would be an internet security breakthrough -
Blog 11 May 2018 Cyber criminals have discovered a new way to bypass Office 365 Safe Links -
Blog 4 May 2018 Data hacked during EPFO-Aadhar seeding -
Blog 25 April 2018 Smartly defining RPO and RTO for Disaster Recovery Plans -
Blog 25 April 2018 Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emails
-
Cryptojacking Attack hits Aditya Birla GroupA big cryptojacking attack took place first time in the country last...
-
ODNS would be an internet security breakthroughThe DNS is essentially a phonebook for the Internet’s domain names. When...
-
Cyber criminals have discovered a new way to bypass Office 365 Safe LinksMicrosoft’s Advanced Threat Protection (ATP) includes a feature called Safe Links. Office...
-
Data hacked during EPFO-Aadhar seedingCyber criminals seem to have hacked the EPFO data which holds information...
-
Smartly defining RPO and RTO for Disaster Recovery PlansRecovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most...
-
Formbook Malware spreading widely by clicking Microsoft URL shortcut files in your emailsBe careful when you receive attachments to an email, it can be...