Digital Transformation Blogs - Bigdata, IoT, M2M, Mobility, Cloud

Susmita Sankaran

Cyber Security

It’s only a matter of time before you become the next victim to a ransomware attack!

Remember the good old days when we discussed about number of computers getting infected by malicious content? Ironic- considering we are discussing about malicious content and ‘good’ in the same breath. Well, if you think of the meteoric rise of ransomware in past few years – the good old Trojan looks almost friendly and harmless. […]
Read Now
Identity and Access Management

Privileged Identity Management – Why We Need It?

In an organization’s IT environment, there are several user accounts.  Out of these, the “Super User accounts” are usually among the most important ones as they are used for System administration.  These accounts are also called root accounts, administrator, admin or supervisor accounts, service accounts, application accounts, emergency accounts and so on depending on the […]
Read Now

Archives

Categories