REPORT
Trust
Interrelated threats targeting an interdependent world
Sophos | 8 December, 2021

As we move into 2022, ransomware shows no signs of slowing down – that’s no ...

ARTICLE
Trust
BazarLoader ‘call me back’ attack abuses Windows 10 Apps mechanism
Sophos | 8 December, 2021

The emails that flooded into inboxes last week came from someone named Adam ...

TECHNOLOGY
Trust
Gaming boom puts gamers, firms in crosshairs of cybercriminals
Abhijit Ahaskar | 8 December, 2021

On June 23, a Hyderabad-based gamer Siddhartha Anumula posted a thread on ...

TECHNOLOGY
Trust
60% ransomware attacks penetrated by RaaS groups in last 18 months: Sophos
Vignesh Ananthraj | 8 December, 2021

Around 60% ransomware attacks were penetrated by the ransomware-as-a-service ...

TECHNOLOGY
Trust
GoDaddy security breach exposes data of 1.2 million WordPress customers
Abhijit Ahaskar | 8 December, 2021

Web-hosting company GoDaddy said in a securities and exchange commission (SEC) ...

INFOGRAPHIC
Automation
Cloud-Native RPA: The Bedrock of Digital-First Businesses
Edge Insights | 29 October, 2021

App modernisation is at the heart of business transformation. Like businesses ...

INTERVIEW
Automation
Digital Dialogue with Yashpal Wala, LafargeHolcim
Team Brand Solutions | 22 September, 2021

RPA is the foundation of the new digital operating model. The world is embracing...

ARTICLE
Automation
Cloud-Native RPA—A Force to Move Forward From The Ground Up
Chetna Kapoor | 20 September, 2021

If you are also among the ones thinking to move forward post-pandemic but ...

Article
Secure Transformation
Cybersecurity Consolidation: Securing More with Less
Chetna Kapoor | 14 September, 2021

Cyber-attack news stories are relentless. Hackers and criminals never seem to ...

Report
Secure Transformation
Six Capabilities to boost your Endpoint Protection
Check Point | 6 September, 2021

Endpoint protection has reached a critical tipping point. Before the COVID ...

Report
Secure Transformation
6 Best Practices for Zero Trust Corporate Access
Check Point | 6 September, 2021

In this new landscape, the traditional “perimeter-based” security model is ...

CUSTOMER SUCCESS STORY
Automation
How ZS Associates is Unleashing the Potential of Cloud Automation
Satish Jha | 2 September, 2021

In the endeavour to digitally transform businesses, organizations often need to ...