Articles articles

When tech is the target: cyber risks for tech companies

When tech is the target: cyber risks for tech companies

By Jonah Papesh, Senior Underwriter, Cyber & Technology, AXA XL In a world in which cyber attacks are increasing in frequency and severity, companies rely heavily on technology to secure their data and systems. But what if your company is a tech company? What are the risks if your business model is to create business

Artificial Intelligence changing healthcare landscape

By Sanjay Pathak – Head Healthcare and Insurance Solutions, 3i Infotech Looking at the upcoming trends globally and across industry ‘Artificial Intelligence/Machine Learning (AI/ML)’ tops the charts. Generally, first thing which comes to mind is machine/cyborg taking over human elements and this has been depicted to various degree in many sci-fi movies. While, the reality

Thanksgiving Day Botnet: November 2018’s Most Wanted Malware

Check Point’s latest Global Threat Index reveals the Emotet botnet rising up the top malware list in November as a result of multiple campaigns; Coinhive remains at top position for 12th consecutive month. Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the

Client at the heart of transformation – Financial services firms rev up digital experiences with IBM Cloud Private

Examples illustrate how the platform’s next-generation hybrid cloud capabilities could help meet digital service expectations of the new-era customer Banks and other financial institutions are today faced with the challenge of being available anywhere, anytime to their customers. With the internet infrastructure becoming widely available, and access devices such as the smartphones becoming both affordable

Hybrid is the way to go in a multi-cloud era

Hybrid is the way to go in a multi-cloud era

With IBM Cloud Private,a journey to the hybrid could be as seamless as it gets The shift to cloud is intrinsic to digital transformation. This does bring up some challenges to organizations either in terms of legacy systems, security,or regulatory requirements. Hybrid cloud is the way to strike a balance with the flexibility of a

Criminals Conceal Miners Under the Guise of Legitimate Thematic Apps: Kaspersky

Kaspersky Lab’s researchers have discovered that more and more cyber criminals are turning their attention to malicious software that is mining cryptocurrencies at the expense of users’ mobile devices. These criminals are getting greedier and now use not only malware, but also risk tools, hiding mining capacities in popular football and VPN applications to profit

Think Cloud that Adds Agility to Legacy SW too

What good is a platform if it isn’t able to cloudify heritage applications and let other applications be empowered by it? Transformation has been a much-used word in today’s enterprise IT contexts. Cloud is a key component of IT transformation. It is relatively easier to take the plunge when it comes to cloudifying storage, servers,

Seven Major European Banks Select IBM to Bring Blockchain-Based Trade Finance to SMEs

Blockchain network designed to help make domestic and cross-border commerce easier. IBM Blockchain running Hyperledger Fabric Selected for Digital Trade Chain. IBM announced that it has been selected by a consortium of seven of Europe’s largest banks to build and host a new trade finance platform based on IBM Blockchain powered by Hyperledger Fabric. The

Top