• About
  • Advertise
  • Privacy & Policy
  • Contact Us
Wednesday, October 4, 2023
DATAQUEST
  • Home
  • News
    Meta layoffs

    Meta Layoffs Employees in its Metaverse Silicon Unit

    IIT Guwahati course

    IIT Guwahati and AlmaBetter Partners to provide Certification in Full Stack Data Science and AI

    Skills

    Top Trending Skills to Build Promising Career in the World of AI

    Coding

    Coding Vs Programming: Which is the Better Career?

    IIIT-B & SAP Labs India

    IIIT Banglore (IIIT-B) Signs A MoU with SAP Labs India

    Google earthquake alert

    Google Introduces Android Earthquake Alert System in India

    Trending Tags

    • election update
    • trump news
    • United Nations
    • whitelisting
  • Business Technologies
    pg8 cover story pix

    Integration of tech into traditional businesses

    5G Ericsson

    5G users in India outpacing global counterparts in daily engagement with apps on mobile phones: Ericsson

    TSMC

    Siemens and TSMC collaborate to help mutual customers optimize designs using foundry’s newest advancements

    Rural broadband in Idukki

    Breaching digital divide: Impact of SD-WAN connectivity on rural and remote connectivity in India

    Jio and NVIDIA

    Jio Platforms partners with NVIDIA to Accelerate AI Cloud Infrastructure In India

    HCLTech

    HCLTech Secures Siemens Contract to Accelerate Cloud-Led Digital Transformation

    Trending Tags

    • Nintendo Switch Pro
    • ClickShare CSE-800
    • Mark Zuckerberg
    • Silicon Valley
    • internet
  • DQDeepTech
    ChatGPT

    Epiphenomenal Scare: The Rise of ChatGPT and the Imperatives for DevOps (Software) Engineers

    Generative AI

    Role of Generative AI in the Modernization of Software Development Process

    ORACLE (7)

    Oracle Unveils New Generative AI Features for Enhancing Customer Service

    Manodayam

    Through AI, we are offering mental health solutions at Rs 1 per day: Sanjay Bhardwaj, founder, Manodayam

    Conversational AI

    Transforming customer experience with conversational AI and language neutralization

    Google

    Google Introduces Generative AI Search Experience in India

  • Leadership Insights
    • Interview
    • Opinion
    • Editors Blog
    • Features
  • Annuals
    Sandeep Dutta and Ajay Vij

    DQ Top 20 Rank 7- Rank 7 – Accenture India, Concerns over revised guidance

    Google

    DQ Top 20 Rank 20 – Google India Driving Growth through Advertising Space Reselling 

    Genpact

    DQ Top 20 Rank 19 – Genpact Transformation Happening Here? 

    Oracle

    DQ Top 20 Rank 17 – Oracle India Business Surges, spearheading Cloud Revolution across Sectors 

    Microsoft

    DQ Top 20 Rank 16 – Microsoft India Robust Outlook Amid Driven by Hybrid Work and Cloud Adoption 

    Mphasis

    DQ Top 20 Rank 15 – Mphasis Mphasizing on AI and quantum 

    Trending Tags

    • Data Loss Prevention 2.0
    • Technology product Development
    • Internet access in developing countries
    • Unilever Ventures
  • DQ40Years
  • Events
    cloud computing

    Cloud Computing and Data Management Reshape Industries: Future-Proofing Organizations

    Oracle Cloud World 2023 Keynote

    Larry Ellison’s Oracle Cloud World 2023 Keynote Highlights: Pivotal Innovations and Industry Insights

    Smart city

    Smart and sustainable city solutions deliver on sustainability and resilience goals

    Forge

    Sustainable building an integrated approach to support customers’ goals

    Buildings

    Honeywell helps building owners drive critical performance

    Gigafactory

    Gigafactories fueling renewable energy transition through automation control technologies

    Trending Tags

    • Revenue Analytics
    • fraud prevention
    • Seven Pillars of Digital India
  • Business Solutions
    cloud computing

    Cloud Computing and Data Management Reshape Industries: Future-Proofing Organizations

    data center

    Navigating the Decision of Opting the Build vs Buy in Data Center

    Schneider

    Schneider Electric showcases innovative, sustainable, and transformative digital solutions at Automation Expo 2023

    Electronics

    Booming Indian consumer market comes with opportunities and challenges for e-commerce brands

    Predictive analytics

    Role of predictive analytics: Unleashing business growth and efficiency

    health tech

    Asia Business Case Centre, NTU Singapore released case study on health tech HealthPlix

    Trending Tags

    • More
      • Tech4Growth
      • DQConclave Event Site
      • TechSchools Event Site
    No Result
    View All Result
    • Home
    • News
      Meta layoffs

      Meta Layoffs Employees in its Metaverse Silicon Unit

      IIT Guwahati course

      IIT Guwahati and AlmaBetter Partners to provide Certification in Full Stack Data Science and AI

      Skills

      Top Trending Skills to Build Promising Career in the World of AI

      Coding

      Coding Vs Programming: Which is the Better Career?

      IIIT-B & SAP Labs India

      IIIT Banglore (IIIT-B) Signs A MoU with SAP Labs India

      Google earthquake alert

      Google Introduces Android Earthquake Alert System in India

      Trending Tags

      • election update
      • trump news
      • United Nations
      • whitelisting
    • Business Technologies
      pg8 cover story pix

      Integration of tech into traditional businesses

      5G Ericsson

      5G users in India outpacing global counterparts in daily engagement with apps on mobile phones: Ericsson

      TSMC

      Siemens and TSMC collaborate to help mutual customers optimize designs using foundry’s newest advancements

      Rural broadband in Idukki

      Breaching digital divide: Impact of SD-WAN connectivity on rural and remote connectivity in India

      Jio and NVIDIA

      Jio Platforms partners with NVIDIA to Accelerate AI Cloud Infrastructure In India

      HCLTech

      HCLTech Secures Siemens Contract to Accelerate Cloud-Led Digital Transformation

      Trending Tags

      • Nintendo Switch Pro
      • ClickShare CSE-800
      • Mark Zuckerberg
      • Silicon Valley
      • internet
    • DQDeepTech
      ChatGPT

      Epiphenomenal Scare: The Rise of ChatGPT and the Imperatives for DevOps (Software) Engineers

      Generative AI

      Role of Generative AI in the Modernization of Software Development Process

      ORACLE (7)

      Oracle Unveils New Generative AI Features for Enhancing Customer Service

      Manodayam

      Through AI, we are offering mental health solutions at Rs 1 per day: Sanjay Bhardwaj, founder, Manodayam

      Conversational AI

      Transforming customer experience with conversational AI and language neutralization

      Google

      Google Introduces Generative AI Search Experience in India

    • Leadership Insights
      • Interview
      • Opinion
      • Editors Blog
      • Features
    • Annuals
      Sandeep Dutta and Ajay Vij

      DQ Top 20 Rank 7- Rank 7 – Accenture India, Concerns over revised guidance

      Google

      DQ Top 20 Rank 20 – Google India Driving Growth through Advertising Space Reselling 

      Genpact

      DQ Top 20 Rank 19 – Genpact Transformation Happening Here? 

      Oracle

      DQ Top 20 Rank 17 – Oracle India Business Surges, spearheading Cloud Revolution across Sectors 

      Microsoft

      DQ Top 20 Rank 16 – Microsoft India Robust Outlook Amid Driven by Hybrid Work and Cloud Adoption 

      Mphasis

      DQ Top 20 Rank 15 – Mphasis Mphasizing on AI and quantum 

      Trending Tags

      • Data Loss Prevention 2.0
      • Technology product Development
      • Internet access in developing countries
      • Unilever Ventures
    • DQ40Years
    • Events
      cloud computing

      Cloud Computing and Data Management Reshape Industries: Future-Proofing Organizations

      Oracle Cloud World 2023 Keynote

      Larry Ellison’s Oracle Cloud World 2023 Keynote Highlights: Pivotal Innovations and Industry Insights

      Smart city

      Smart and sustainable city solutions deliver on sustainability and resilience goals

      Forge

      Sustainable building an integrated approach to support customers’ goals

      Buildings

      Honeywell helps building owners drive critical performance

      Gigafactory

      Gigafactories fueling renewable energy transition through automation control technologies

      Trending Tags

      • Revenue Analytics
      • fraud prevention
      • Seven Pillars of Digital India
    • Business Solutions
      cloud computing

      Cloud Computing and Data Management Reshape Industries: Future-Proofing Organizations

      data center

      Navigating the Decision of Opting the Build vs Buy in Data Center

      Schneider

      Schneider Electric showcases innovative, sustainable, and transformative digital solutions at Automation Expo 2023

      Electronics

      Booming Indian consumer market comes with opportunities and challenges for e-commerce brands

      Predictive analytics

      Role of predictive analytics: Unleashing business growth and efficiency

      health tech

      Asia Business Case Centre, NTU Singapore released case study on health tech HealthPlix

      Trending Tags

      • More
        • Tech4Growth
        • DQConclave Event Site
        • TechSchools Event Site
      No Result
      View All Result
      DATAQUEST
      No Result
      View All Result
      Home Business Technologies

      Guidance for CIOs and CISOs during COVID-19: Sophos

      DQI BureaubyDQI Bureau
      April 7, 2020
      in Business Technologies
      0
      Forrester

      cio

      Cyberattackers are resourceful and opportunistic. They will move quickly to take advantage of a situation. COVID-19 is no different. There is a huge amount of global uncertainty and change right now which criminals are seeking to capitalize on. The risks are amplified by the immediate and unforeseen IT challenges that companies are having ensuring their staff can work from home.

      There are two areas which are most likely to result in a cybersecurity incident due to the ongoing crisis: remote access and phishing. We’ll cover both in this article and provide a set of prioritized recommendations to expeditiously prevent, or at least mitigate, these critical issues.

      Remote access
      By remote access I’m referring to the myriad ways organizations are allowing their employees to work from home. These range from the obvious “traditional” remote access services, such as VPN and terminal service gateways, as well as cloud-native conferencing and other collaboration tools that organizations everywhere are adopting in a hurry. The key risk is weak authentication of your remote access services.

      Organizations have been battling for years to ensure services (particularly when internet-facing) are protected by multi-factor authentication (MFA), and only accessible with centrally-managed corporate accounts (typically held in Active Directory, Azure or Okta). Doing this well is a real challenge at the best of times and requires IT staff to have intricate knowledge of SAML, OpenID and various other technologies and standards that support our modern identity management.

      This is, of course, on top of all the legacy technologies (LDAP, RADIUS, Kerberos, etc…) that are still in place to support authentication in traditional architectures. Throw in a global crisis with IT teams worldwide scrambling to keep services accessible and it’s obvious the complexity of identity federation and MFA claims will not be top of mind. This is perfectly understandable and, in most cases, taking risk to get services online is absolutely the right decision.

      With business fighting to survive, business continuity and availability should take precedence. The security problems occur for a couple of reasons. Firstly changes being made quickly on the front line may not been seen or understood by leaders in the organization better placed to evaluate the resultant risk.

      Secondly, even when risk assessments were made, the original premises are probably no longer correct. Only a few weeks ago we were expecting everything to be back to normal in a month or so. It’s now becoming very clear that this new reality may be long term and the window of exposure resulting from poorly protected services could extend months, or even years. Furthermore, it’s going to be very hard for organization to go back to previous working models once employees realise you can work from home very effectively.

      In short, organizations must not assume they will quickly be able to remove all these risky internet-facing services. They instead need to figure out how to secure them.

      What should IT and security leaders do?
      There are long term and short term fixes. Long terms fixes boil down to a zero trust approach. There is no doubt this crisis will accelerate the shift towards zero trust architectures. Unfortunately organizations cannot and should not rush in this direction as it requires large IT infrastructure investment and changes to organisational mindset to be executed successfully.

      Organizations should focus their efforts on tactically reducing risk as quickly as possible. Primarily this means ensuring key services as protected with MFA by any means possible. This is best tackled per service. Organizations need to identify which services are most at risk and most valuable to their adversaries. For organizations with on premise infrastructure and traditional perimeter-based security these are likely to be VPNs and other remote access gateways.

      For organizations with cloud infrastructure, the focus should be their identity provider (most commonly, Azure or Okta). As the central point for authentication, simply enabling MFA here will get you the biggest and quickest win, especially, as both Azure and Okta have integrated MFA capabilities and integrations with popular third party providers, such as Duo.

      Organizations that haven’t managed to centralise cloud identities will need to look at specific applications and see if they offer their own MFA capabilities. Mail, collaboration, CRM and ERP systems are the obvious places to start. Also consider highly-critical but less widely accessed services such as your security management tools. This Knowledge Base article walks you through setting up MFA in our Sophos Central security platform.

      Making tough trade-offs
      Even these tactical options are not easy and compromises will need to be made. The exact balance of trade-offs will be different for every organisation but here are some considerations:

      VPN capacity
      If you’re backhauling client traffic to scrub, allowing “Split VPNs” (where clients go direct to the internet) is the quickest way to gain capacity and likely less risky than exposing squishy, insecure internal services directly online. However this does depend on your clients having well-patched browsers and, ideally, endpoint based web-protection. Also be aware that if you have SaaS services relying on clients coming from known corporate IP addresses don’t simply turn off that control – replace it with MFA!

      Centralized vs. de-centralized MFA
      Attaching MFA to your identity provider allows for a common experience across all applications. This is undoubtably less confusing for staff and easier to rollout. It’s also a much longer route if you don’t have a centralized identity service. Retrofitting federated identity to an existing production app can be really hard so, tactically, it may be easier to enable MFA capabilities from the service provider. This does mean staff will likely have multiple different authentication mechanisms to navigate.

      Not ideal, but don’t forget, they are used to handling this when logging on to non-work applications (internet banking, personal email, etc). Everyone is handling a lot of change right now so they may be more accommodating and resilient than you might expect!

      SMS-based MFA
      There’s a lot of very valid concerns about SMS-based MFA. It’s also the simplest and quickest way to get MFA enabled, particularly as staff will likely be familiar with it. SMS-based MFA is still immeasurably better than no MFA. If it’s the fastest route to protecting your business, it’s very likely the right place to start. Just make sure you have a migration plan to something more secure.

      Passwords
      If you’re spinning up new services (e.g. video-conferencing) and are unable to setup federated identity, employees are going to need to remember even more passwords. The biggest risk with this is password reuse. You can’t reasonably expect employees to remember dozens of unique passwords. A password manager is the best tool to get around this problem.

      Unfortunately, the password managers do take some getting used to and the UX can be very confusing for non-technical staff. In a pickle, writing passwords physically down in a notebook is not the worst thing right now. It may fly in-the-face of conventional wisdom but with everyone at home, the chances of that notebook falling into the hands of an adversary is slim right now. Just try and find a better solution – and change the passwords – before staff start travelling again!

      Other considerations
      Beyond MFA there are a couple other related remote-access risks to consider:

      VPN and remote access gateway vulnerabilities
      Patching critical infrastructure probably feels risky right now. Unfortunately in the past few months there have been some very serious vulnerabilities in common remote access equipment. These vulnerabilities are being actively exploited by multiple criminal groups right now. If you have a vulnerable service you need to patch immediately. Just have a backup plan in-case the device fails to patch (especially if you’re unable to get physical access).

      Endpoint security updates
      Check your infrastructure to make sure that you are still receiving updates from your endpoint security provider. If you have a cloud-based management (such as Sophos Central) you’re probably ok but if not, it’s essential that your clients can reach updating services. This requires checking that your VPN allows access to your update server(s) (and that you have capacity). Don’t forget to consider clients that may not regularly connect to the VPN.

      Phishing attacks
      Phishing attacks using COVID-19 as a lure are the most visible and immediate cybersecurity risk in the ongoing crisis. This isn’t surprising as we’ve seen attackers use current events as a lure for many years. Unfortunately the risks this time are higher. Firstly everyone is worried and handling an unprecedented change to their daily lives. High stress situations make everyone hungry for information and less likely to objectively evaluate any message they receive.

      Secondly, IT departments and service providers are bombarding us all with legitimate messages about changes to services. Combine these issues and it’s unrealistic to expect employees to accurately identify and report all attacks. You need to assume that some will get through and some staff will be duped. Accepting this allows you to focus on being resilient to attacks rather than hoping to avoid them. There’s already a lot of advice on this so I’ll briefly cover the basics:

      MFA
      Good news is that we’ve already covered the most important defence! Credential phishing, whereby the attackers put up a fake login page to trick staff into entering their credentials, is the most common form of phishing. MFA is a great (albeit not always perfect) form of defense against this*.

      Awareness
      This is still important. By encouraging phishing reports from staff you can warn others, and if you have a security operations team (or service), even analyse the attack to identify indicators or compromise to feed into threat hunting processes.

      Endpoint and email defenses
      Your security software has multiple chances at catching a phishing attack. The more chances you give it the better the overall protection:

      • It can refuse to even receive the email as it knows it’s coming from spammer.
      • It can scan the email and all the attachments and URLs in order to block it.
      • Web filtering can block connections to malicious websites or spot a malicious payload on the site.
      • Endpoint software can spot malicious files and behavior should all the previous defenses fail and the employee ends up running something malicious on their system.

      The better-configured and effective all of these defenses are, the less likely an attacker will manage to evade everything.

      Patching
      Drive-by-downloads are less common nowadays but still a real risk. Patching browsers, mail clients and applications (such as Microsoft Office) which are regularly used to open attachments will limit the really nasty attacks that rely on minimal user-interaction. Lastly, there are few reasons to be running browser plugins such as Flash, Java, etc. nowadays – disable them if you possibly can, it’s much easier and safer than trying to keep them update.

      Conclusion
      Criminals are already taking advantage of COVID-19 in their cyberattacks, and remote access and phishing are the two areas most likely to result in a cybersecurity incident. We’ve covered a number of steps you can take to mitigate this risk. We also realize that time is in short supply so have compiled a list of the top seven steps we recommend all organizations take.

      They are listed in priority order, so start at the top and work down.

      1. Ensure all internet facing services are protected with MFA (SMS-based MFA is better than no MFA)

      2. Patch remote access services – particularly VPN and terminal service gateways.

      3. Monitor phishing reports and get your operations team or MTR service to hunt for associated IOCs.

      4. Check remote clients are still receiving their endpoint security updates.

      5. Ensure your OS, browser, email client and software commonly used to open attachments is set to update automatically.

      6. Disable browser plugins such as Java, Flash and Acrobat.

      7. Use identity federation to ensure all cloud services are accessed with corporate credentials.

      Stay vigilant. Coronavirus-related attacks will likely ramp-up over the coming weeks and months.

      • Ross McKerchar, CISO, Sophos.
      Tags: CIO
      Previous Post

      WhatsApp Fights Fake News on Coronavirus, Reduces Forward Limit to One Chat at a Time

      Next Post

      Should the Coronavirus Lockdown in India be Extended? Yes say Citizens of the Country

      Related Posts

      pg8 cover story pix
      Business Technologies

      Integration of tech into traditional businesses

      October 3, 2023
      5G Ericsson
      Business Technologies

      5G users in India outpacing global counterparts in daily engagement with apps on mobile phones: Ericsson

      October 3, 2023
      TSMC
      Business Technologies

      Siemens and TSMC collaborate to help mutual customers optimize designs using foundry’s newest advancements

      September 29, 2023
      Rural broadband in Idukki
      Business Technologies

      Breaching digital divide: Impact of SD-WAN connectivity on rural and remote connectivity in India

      September 26, 2023
      Jio and NVIDIA
      Business Technologies

      Jio Platforms partners with NVIDIA to Accelerate AI Cloud Infrastructure In India

      September 8, 2023
      HCLTech
      Business Technologies

      HCLTech Secures Siemens Contract to Accelerate Cloud-Led Digital Transformation

      September 8, 2023
      Next Post
      Lockdown in India

      Should the Coronavirus Lockdown in India be Extended? Yes say Citizens of the Country

      Healthcare

      Health 4.0 in Indian Healthcare and Coronavirus on World Health Day

      IRCTC Website Down

      IRCTC Cancels Bookings till 30 April: How Will Passengers Get their Refunds?

      Leave a Reply Cancel reply

      Your email address will not be published. Required fields are marked *

      • Trending
      • Comments
      • Latest
      Hybrid Cloud

      Run complex workloads with ease: Switch to Lenovo Hybrid Cloud solutions

      August 18, 2023
      IIT Madras

      IIT Madras Invites Applications for Two Year Artificial Intelligence Fellowship with Stipend of Rs 40,000

      August 18, 2023
      WhatsApp no valid QR code

      Here’s How to Activate a Banned WhatsApp Number

      January 14, 2020
      IIT Kharagpur

      IIT Kharagpur Announces Free Online Course on Google Cloud Computing

      August 16, 2023
      WhatsApp no valid QR code

      Here’s How to Activate a Banned WhatsApp Number

      1652
      Exams in India

      CBSE Board Exams 2021: Students Request Indian Government to Cancel Board Exams Due to Rising COVID-19 Cases

      893
      Delhi Schools

      CBSE Board Exams 2021: Do Not Postpone or Cancel Board Exams, Say Section of Students

      577
      Online courses

      AWS Announces Free 12-week Course on Cloud Computing for Unemployed People Interested in Cloud Careers

      510
      Meta layoffs

      Meta Layoffs Employees in its Metaverse Silicon Unit

      October 4, 2023
      Sanjay Deshmukh

      “AI is capable of the most dominant outcome, humanizing the interaction between users and computer systems”

      October 4, 2023
      data poisoning

      The poison is not in a dart. It’s in the AC duct.

      October 4, 2023
      cloud computing

      Cloud Computing and Data Management Reshape Industries: Future-Proofing Organizations

      October 4, 2023
      Meta layoffs
      News

      Meta Layoffs Employees in its Metaverse Silicon Unit

      Meta the parent company of Instagram and WhatsApp plans to lay off its employees from the Reality Labs division. This ...

      October 4, 2023
      Sanjay Deshmukh
      Interview

      “AI is capable of the most dominant outcome, humanizing the interaction between users and computer systems”

      According to forecasts, the market for generative AI would grow from USD 11.3 billion in 2023 to USD 51.8 billion ...

      October 4, 2023
      data poisoning
      Features

      The poison is not in a dart. It’s in the AC duct.

      Data Poisoning, the sly and silent monster, is already around. If we are not worried already by the glimpse that ...

      October 4, 2023
      cloud computing
      Business Solutions

      Cloud Computing and Data Management Reshape Industries: Future-Proofing Organizations

      Mastering cloud and data management strategies isn't merely an option; it's a mandate for any organization aspiring to flourish. During ...

      October 4, 2023
      data center
      Business Solutions

      Navigating the Decision of Opting the Build vs Buy in Data Center

      Recent reports suggest that India is on its way to become a USD 1 trillion digital economy by 2030, fuelled ...

      October 4, 2023

      Industry Insights

      data poisoning

      The poison is not in a dart. It’s in the AC duct.

      October 4, 2023
      digital asset management platform

      Exploring Digital Asset Management platform Digiboxx

      September 27, 2023
      Digital transformation

      Digital transformation in trading: Navigating the future of investments

      September 26, 2023
      Machine Unlearning

      Eternal Sunshine of the Spotless Model – Hello, Machine Unlearning!

      September 26, 2023
      Load More

      DQ 40 Years

      Sridhar Vembu
      Interview

      Only with R&D can you escape the trap and go to the next level: Sridhar Vembu, Cofounder and CEO, Zoho

      August 25, 2023
      The many specials of CyberMedia 1
      Business Technologies

      The many specials of CyberMedia

      July 22, 2023
      Rajendra S Pawar
      Business Technologies

      From 1980 to 2047—Time Lapse from NIIT’s lens

      July 22, 2023
      Shiv Nadar
      Business Technologies

      Indian IT: Re-inventing itself for the next 25 years

      July 22, 2023

      Editors Blog

      Ed Nair
      Editors Blog

      “ED” as we called him

      October 4, 2023
      pg7 cartoon
      Editors Blog

      Demographic dividends, skills & tech

      October 3, 2023

      Recommended

      Ed Nair

      “ED” as we called him

      October 4, 2023
      cloud computing

      Cloud Computing and Data Management Reshape Industries: Future-Proofing Organizations

      October 4, 2023
      Load More

      Most Popular

      Hybrid Cloud
      Business Technologies

      Run complex workloads with ease: Switch to Lenovo Hybrid Cloud solutions

      August 18, 2023
      WhatsApp no valid QR code
      News

      Here’s How to Activate a Banned WhatsApp Number

      January 14, 2020
      Big Tech Firms
      News

      Beware of China Domain Name Registration Scam, Ignore Mails from .cn Mentioning Domain Conflict

      June 2, 2021
      Load More
      DATAQUEST

      Launched in 1982 as India’s first IT print publication, Dataquest is known as the “Bible of Indian IT.”
      Features business technologies, enterprise tech, cloud, hybrid multi-cloud, data management, security, IT Infrastructure, emerging technologies, analysis of market trends, a new development in the IT industry and needs of corporate users, Jobs, Deep Tech, interviews of CEOs / CIO's / MDs, and Annual surveys.

      Category Links

      • Annuals
      • Business Solutions
      • Business Technologies
      • DQDeepTech
      • Editors Blog
      • Events
      • Features
      • Interview
      • Module
      • News
      • Opinion

      Newsletter

      Subscribe to our mailing list to receives daily updates direct to your inbox!

      *Invalid email address.
      • About
      • Advertise
      • Privacy & Policy
      • Contact Us
      • PCQuest
      • DataQuest
      • Voice&Data
      • CIOL
      • DQ Channels

      © Copyright © 2023 Cyber Media (India) Ltd. All rights reserved.
      Reproduction in whole or in part in any form or medium without written permission is prohibited.

      No Result
      View All Result
      • Home
      • News
      • Business Technologies
      • DQDeepTech
      • Leadership Insights
        • Interview
        • Opinion
        • Editors Blog
        • Features
      • Annuals
      • DQ40Years
      • Events
      • Business Solutions
      • More
        • Tech4Growth
        • DQConclave Event Site
        • TechSchools Event Site

      © Copyright © 2023 Cyber Media (India) Ltd. All rights reserved.
      Reproduction in whole or in part in any form or medium without written permission is prohibited.