By Augusto Barros, Cybersecurity Evangelist, Securonix What is Log4j vulnerability? Log4shell is a major flaw in the widely used logging programme Log4j, which is used by...
Every company is already an IT company today. Corporates or SMEs, every workplace today is accessing digital tools and solutions most organically. We are adapting...
By: Abhishek Agarwal, President, Judge India – Global Delivery, The Judge Group The digital business needs IT systems and strategies that can handle a multi-channel...
By: Daniel Pullen, Chief Automation Officer, CiGen Intelligent automation is set to empower the Internet of Things (IoT) as we head towards 2022 as data...
Authored Article: Mr. VikasKakwani, Founder, AAS Vidyalaya The education industry has undergone a revolutionary change in recent times. Although these changes were ushered in by...
By: David Pickering, Director, Solution Engineering, APAC at Cherwell (acquired by Ivanti) The spotlight on IT teams over the past year has pushed the no-code...
By- Brijesh Miglani, Lead Security Consultant, Force point The recent news of cyberattack on a large private bank, where banking operations were halted for two...
By: Ian Hooper – Partner and Head of Banking & Payments, CAPCO The coronavirus pandemic has demonstrated just how vulnerable our business and financial services...