Articles articles

Cloud Hosted Services: Some security considerations

Cloud Hosted Services: Some security considerations

By Nikhil Taneja Managing Director-India, SAARC & Middle East, Radware A multi-cloud approach enables organizations to move application services to various public cloud providers depending on the desired service level and price points. Most organizations will use multiple cloud providers; some in addition to their private cloud and on premise deployments. Multi-cloud subsumes and is

Autonomous technologies: an uncertain and evolving risk landscape

By Mukadder Erdoenmez, Head International Casualty, Europe, AXA XL Propelled by massive investments and impressive technological advances, autonomous vehicles are quickly becoming more numerous and capable, and appear in a wider variety of settings. Today, mobile autonomy applications include semi-autonomous to fully self-driving cars, taxis, buses and trucks operating on public roads; shuttle vans moving

Bot Manager vs. WAF: Both are equally needed

By Nikhil Taneja Managing Director-India, SAARC & Middle East, Radware Over 50% of web traffic is comprised of bots, and 89% of organizations have suffered attacks against web applications. Websites and mobile apps are two of the biggest revenue drivers for businesses and help solidify a company’s reputation with tech-savvy consumers. However, these digital engagement

Artificial Intelligence changing healthcare landscape

By Sanjay Pathak – Head Healthcare and Insurance Solutions, 3i Infotech Looking at the upcoming trends globally and across industry ‘Artificial Intelligence/Machine Learning (AI/ML)’ tops the charts. Generally, first thing which comes to mind is machine/cyborg taking over human elements and this has been depicted to various degree in many sci-fi movies. While, the reality

Thanksgiving Day Botnet: November 2018’s Most Wanted Malware

Check Point’s latest Global Threat Index reveals the Emotet botnet rising up the top malware list in November as a result of multiple campaigns; Coinhive remains at top position for 12th consecutive month. Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the

Client at the heart of transformation – Financial services firms rev up digital experiences with IBM Cloud Private

Examples illustrate how the platform’s next-generation hybrid cloud capabilities could help meet digital service expectations of the new-era customer Banks and other financial institutions are today faced with the challenge of being available anywhere, anytime to their customers. With the internet infrastructure becoming widely available, and access devices such as the smartphones becoming both affordable

Hybrid is the way to go in a multi-cloud era

Hybrid is the way to go in a multi-cloud era

With IBM Cloud Private,a journey to the hybrid could be as seamless as it gets The shift to cloud is intrinsic to digital transformation. This does bring up some challenges to organizations either in terms of legacy systems, security,or regulatory requirements. Hybrid cloud is the way to strike a balance with the flexibility of a

Criminals Conceal Miners Under the Guise of Legitimate Thematic Apps: Kaspersky

Kaspersky Lab’s researchers have discovered that more and more cyber criminals are turning their attention to malicious software that is mining cryptocurrencies at the expense of users’ mobile devices. These criminals are getting greedier and now use not only malware, but also risk tools, hiding mining capacities in popular football and VPN applications to profit

Top