security

Recap Rootconf 2018 – a look at the current and future security trends of IT infrastructure and DevOps

HasGeek hosted 400+ developers, architects, managers and security experts at Rootconf 2018, which concluded on 10-11 May 2018. The two-day conference, held at NIMHANS Convention Centre, had over 35 se...

SSAE16 vs. SSAE18: What’s The Difference?

There’s a new SOC audit standard in town – and you need to know what it is and means if you’re to make an informed decision about your hosting company. For years, SSAE16 has been the go-to stand...

Rootconf 2018 calling out all DevOps, DevSecOps and IT managers for meeting and learning at one place

The current workflows in technology infrastructure management is becoming complicated and messy. With the recent reports of security breaches due to leaky infrastructure across the industry and govern...

Calling all the blockchain enthusiasts in the largest blockchain conference: World Satoshi Summit 2018

South Asia’s largest conference on blockchain – World Satoshi Summit 2018, is all set to revolutionize the technology underpinning cryptocurrency, through its global series of events. The first event ...

Secura Partners with HyTrust to Offer Robust Virtual Machine Level Data Encryption as a Service

Secura is delighted to announce a partnership with workload security specialist HyTrust, to offer HyTrust DataControl virtual machine level encryption to customers as a service, on flexible, monthly t...

CloudFest – the mega cloud and hosting festival in full swing – fog, edge computing, latest processors and more

CloudFest, formerly WorldhostingDays, is the wonderland of cloud and hosting industry. The mega 7-day festival has kickstarted from 10th March in Europa-Park Rust, Germany, and is now in top form with...

Hidden cryptocurrency mining malware found in apps and WordPress sites 

A new malicious cryptocurrency miner was found on Google Play store, and WordPress sites recently, that pretends to be legitimate by using dynamic JavaScript loading and native code injection. It infe...

Cisco to acquire telecommunication software firm BroadSoft for $1.9 billion

Cisco, the largest networking gear manufacturer, announced that it will acquire BroadSoft, the U.S. telecommunications software firm, for approximately $1.9 billion cash.  With this, Cisco seems to ha...

Google ramps up G Suite security console

Google recently announced a new security feature – OAuth apps whitelisting, for its G Suite customers. The feature will provide better visibility and power in hands of the customers, allowing them to ...

Windstream Hosted solutions to Open 72,000-Square-Foot Enterprise Class Data Center in Charlotte, NC

Managed Hosting provider Windstream Hosted Solutions today announced undergoing construction of it’s  new 72,000-square-foot enterprise-class data center in Charlotte, North Carolina that is goi...

Cloud-based website security provider 6Scan Partners with StableHost

Cloud-based website security provider 6Scan Ltd. today announced its partnership with web hosting provider StableHost. 6Scan provides a high-level of protection against vulnerabilities and malware, ye...

Understanding Role of Code Signing Certificates in Mobile Application Security

Mobile Applications have met with wide acceptance globally, thanks to their easy installation, streamlined interface, great user experience, and the ability to download them easily via online and offl...

  • 1
  • 2
  • 4
Skip to toolbar