Estimated reading time: 3 minutes
With the world moving towards a machine determined future, somewhere deep within, it does bother many of us when we think about the power we intend to leave in the hands of machines. Honestly, some of us are worried...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 3 minutes
An organization spends significant amount of money and effort on implementing cybersecurity yet it can be breached. In such situations, how does an organization identify if it had taken enough measures to protect itself before the breach occurred? This is where a security...Estimated reading time: 3 minutes
Smartphones have made way into our personal and professional life. Apart from always being connected to the world, there are many business functions that users, today, perform with their smartphones. Business emails, document reviews, editing, and video conferencing are just...Estimated reading time: 4 minutes
Use of technology provides improvements in productivity, cost savings and more accurate process execution in almost all industries. This applies to both private and public sector (Government bodies). Use of technology reduces back logs, increases the speed of processes and improves overall...Estimated reading time: 2 minutes
The recent zero-day vulnerability in .NET Framework vulnerability CVE-2017-8759 enables attackers to perform a Remote Code Execution on the targeted machine. This vulnerability is found to be exploited in the wild through email spam messages loaded with malicious RTF files...