Three reasons why spear phishing is so effective
Security Operations Center as a Service. How does it work?
Disk Encryption at the Service of Confidentiality
Urban Transport Infrastructure Grows Smarter
EFES Kazakhstan migrates the IT infrastructure components to Microsoft Azure
Threat Spotlight: IoT application vulnerabilities leave IOT devices open to attack
Blockchain-based online store for educational institutions
Office 365: additional services that you didn’t know about
Penetration Tests: Can You Get Hacked Or Not?
Outsourcing has Long since been Ruling the Word
Security Operations Centers. How Do They Work?
Information security as a part of digital transformation
Microsoft Azure for Small and Medium Businesses
What’s so new about Digital Transformation?
10 reasons to migrate to Microsoft SQL Server 2019
Breakthrough Projects Anticipate the Fourth Industrial Revolution
Artificial Intelligence Technologies are the Mainstream Direction for the IT Market in General
Mobile Tricks: a Few Ways to Cheat DLP Systems and to Prevent It
Digital transformation without clouds? No way!
Digital HR. Non-human Resources for Personnel Management
Agro-Invest Streamlines Its Development Processes Using the Cloud-Based Azure DevOps Platform
New Technologies in Healthcare: Digital Transformation and its Case Studies
In the digital economy era the winners are those who experiment with technologies
A dozen predictions on cybersecurity trends for 2019