Home Search

pooja tikekar - search results

If you're not happy with the results, please do another search
Gift Cards, cyber ghosts

Ghost of the Cyber Past, Present, and Future [INFOGRAPHIC]

0
HOHo Ho! It’s Christmas! The holiday season is the perfect time to re-read Charles Dickens’ timeless classic, “A Christmas Carol.” To those of you...
1 in 3 CISOs feel biggest challenge of endpoint solution is its complexity

Are You a Thought Leader CISO? [INFOGRAPHIC]

0
Information security is a growing concern for small and big businesses alike. While we do everything we can in our power to protect the...
Microsoft Azure App, Zero-Day Vulnerability

Moving from Human Error to Human Firewall

0
Cybersecurity experienced multiple challenges in 2020. Rapid digitalization and the new normal — work from home — brought new opportunities as well as risks....
Ec-Council-Aware App

Are You Cyber-aware? EC-Council’s Aware App Gamifies Learning

The world is reforming. Technology has become an integral part of our lives and businesses are undergoing a radical digital transformation. And digital transformation...
Amruta Gawde_interview

“From an IAM perspective, human and device identities are treated equally”

0
From dispersing office spaces to remote working, COVID-19 forced organizations to have a holistic approach to cybersecurity. Business continuity transformed overnight to navigate through...
COVID-19 Cyberthreats

Cybersecurity in Times of a Pandemic [INFOGRAPHIC]

0
The COVID-19 pandemic has disrupted global health, the economy, and social systems. From emptying office spaces to dispersing the workforce, corporates have yet ensured...
google cloud

How Threat Actors Exploited Google Cloud to Launch Phishing Attacks

0
The world today is increasingly digital. And with rapid digital transformation and technology adoption, hackers are misusing the situation with more targeted attacks. A...
endpoint security

Endpoint Security: No More a Blind Spot for Remote Work

0
The COVID-19 pandemic has forced businesses to operate remotely. While working from home is becoming the new normal, the drastic change in the SOPs...
healthcare cybersecurity, Nucleus:13

Unisys Supports Cyber4Healthcare Program to Make Cyberspace More Secure

0
Information technology company Unisys Corp. will be supporting CyberPeace Institute's Cyber4Healthcare initiative to ensure hospitals and health care organizations are protected against the increasing...
ransomware

Not a Hoax! REvil Ransomware Operators Launch Auction Website

0
The operators of REvil ransomware, better known as Sodinokibi, have launched an auction website on the dark web, Happy Blog, to sell stolen data...

MOST POPULAR

RECENT POSTS