@Security & Compliance
More SMBs Investing In Data Security, CRM: Study
by CXOtoday News Desk    May 21, 2018
A new survey shows how CRM software is the way successful businesses nurture their customers and open up their sales funnel.
Cyber-criminals Focus On Supply Chain To Exploit Business Data
by CXOtoday News Desk    May 18, 2018
In 2017, there was a massive 350% rise in targeted ransomware, and the trend is here to stay and worsen.
What Stops Millennials From Pursuing Cybersecurity Career?
by CXOtoday News Desk    May 18, 2018
A lack of awareness of the field is preventing Millennial candidates from pursuing it, widening the cybersecurity talent gap, according to a new study
85% Companies Not Ready For GDPR Compliance: Report
by CXOtoday News Desk    May 18, 2018
A recent research suggests that some companies are overlooking the business opportunity of GDPR.
Making Digital Transactions Simpler And Secured
by Sohini Bagchi    May 17, 2018
Innoviti CEO Rajeev Agrawal explains how the company is working towards making digital payments speedier, simpler and more secured.
Blockchain To Shape Next-Gen Supply Chains In Healthcare: GlobalData
by CXOtoday News Desk    May 09, 2018
This can by help in reduce fraud and better manage quality in the manufacturing and distribution of pharmaceutical products, according to GlobalData.
GDPR’s Security Measures, Breach Notification For Indian IT
by Sreekanth Nemani    May 07, 2018
What will be the impact of GDPR on Indian IT? Moreover, How Indian IT enterprises should prepare for it?
India, Fifth Most Affected Country By WannaCry: F-Secure
by CXOtoday News Desk    May 04, 2018
WannaCry emerged as the most frequently seen ransomware threat last year, according to F-Secure.
How Firms Can Check Unsuspecting Information Leaks
by Dr. Yavar Ehsan    May 01, 2018
Many executives out there are susceptible yet unaware of what a twisted mind can accomplish without even being detected for months, perhaps years.
The Perils Of Ignoring Mobile App Security
Lack of attention to security, especially regarding applications that often hold sensitive personal and business information, can introduce threats.
PAGE: 12345678910