CERTIFICATE
Eminent CIOs 2025
Most Trusted Companies 2025
Promosing Partner 2025
Most Admired Brand 2025
CMO of the Year 2025
SYNDICATION
AMD
DELL TECHNOLOGIES
HITACHI
LOGMEIN
MICROSOFT
RIVERBED
THALES
EVENTS
SEPTEMBER ISSUE
INFOGRAPHICS
PRESS
Press Release - VARINDIA
Press Release - PR News Wire
SPECIAL
CHANNEL GURU
CASE STUDY
CSR INITIATIVES
EDITOR SPEAK
ROUND ABOUT
SERVICES
SMART CITY
SME
TECHNOLOGY DISRUPTION
TECHNOMANIA
WHITE PAPER
TECHTREND
LTE
NETWORKING
POWER
SOFTWARE
VAR PANCHAYAT
SUBSCRIBE
Apps
New Age
AI/ML
Cloud Computing
Crypto Computing
Data Privacy
Digital Twin
TECHNO BLOGGING
Telecom
WFH
CLS
2025
2024
Blogs
Podcast
Career
Ask an Expert
Faceoff AI
TechAxis Report
HOME
Blogs
Cybersecurity for banks - Assuring a secure & compliant cloud migration
Managing Security Threats With Detection Development Life Cycle
Mastercard, Visa and PayPal miss out on combined $2.4 billion in revenue due to Russia-Ukraine conflict
Russia/Ukraine-themed War Documents become Lure of Choice for Cyber Espionage
World Backup Day: 5 data recovery tips for everyone!
New recognition for Schneider Electric from World Economic Forum
Samsung and Western Digital Begin Far-reaching Collaboration to Drive Standardization of Next-generation Storage Technologies for Broader Ecosystem Support and Customer Adoption
Three Imperatives Driving the Top Trends in Data and Analytics for 2022,says Gartner
Snowflake Launches Retail Data Cloud to Enable Collaboration, Deliver Exceptional Customer Experiences, and Optimize Operations for Retailers
Crypto-trading Scam Demands Thousands of Dollars in Fake “Profit Tax” To Unlock Victims’ Accounts, Sophos Finds
Rethinking Soar: Why Automation Needs To Be an Innate Characteristic, Not a Bolted-on Afterthought
How E-Governance will play an important role in India’s infrastructural development
« Previous
Next »
Showing
1705
to
1716
of
2535
results
‹
1
2
...
140
141
142
143
144
145
146
...
211
212
›
See What’s Next in Tech With the Fast Forward Newsletter
subscribe
SECURITY
View All
YouTube 'Ghost Network' Exploited to Spread Stealer Malware via Hacked Channels
Sophos honored with Pax8 Vendor Breakthrough Award at Beyond 2025
Operant AI uncovers ‘Shadow Escape,’ a zero-click attack targeting AI agents
SOFTWARE
View All
Mercedes-Benz India and Zoho launches SKYLine – a decentralized Dealer Management System
Zendesk Named a Leader in the 2025 Gartner Magic Quadrant for CRM Customer Engagement Center
IBM announces digital asset platform - Digital Asset Haven
START - UP
View All
OpenAI Buys Mac AI Startup Behind ‘Sky’
AI startup FireAI raises ₹4 crore seed funding from Inflection Point Ventures
Climate-tech innovator Newtral raises $600K to scale AI-powered sustainability platform globally
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.
VIEW ON TWITTER
CIO - SPEAK
Automation has the potential to greatly improve efficiency and production
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost
Start-Up and Unicorn Ecosystem
Edge AI and IoT: Powering the 2030 Innovation Revolution
Lack of Career Growth Tops Global Workplace Barriers, Report Finds
This Holiday Season, Generative AI Becomes the New Search
VPNs Lose Relevance in Cloud-First Security Era
Emerging Markets Boost Used Phone Sales
Hackers Can Turn Your Computer Mouse Into a Spy Mic
Hackers Exploit Blockchain to Conceal Malware?
“Pixnapping” — The New Android Hack Stealing Your Screen Secrets
Hackers Exploit Blockchain to Conceal Malware”
China Weaponizes Rare Earths in Global Tech Power Play
×