As the deadline for payment companies to comply with the Reserve Bank of India’s (RBI) data localisation rule ran out, major payment network players, including Visa and Mastercard, were in breach. While there was no official word on the status…

As the deadline for payment companies to comply with the Reserve Bank of India’s (RBI) data localisation rule ran out, major payment network players, including Visa and Mastercard, were in breach. While there was no official word on the status…
The RBI's deadline of 15 October for all payment system operators to comply with the central bank’s data localisation norms just went by. Companies like Visa, American Express, Facebook, PayPal, Mastercard, Google and WhatsApp are required, as per the Reserve…
As the deadline for payment companies to comply with the Reserve Bank of India’s (RBI) data localisation rule ran out, major payment network players, including Visa and Mastercard, were in breach. While there was no official word on the status…
The Reserve Bank of India is unlikely to extend the October 15 deadline for the payments ecosystem players to set up a facility to store transaction-related data in India. Those players that do not comply with the central bank’s April…
Indian companies, including startups, have been trying to make sense of the European Union's General Data Protection Regulation (GDPR), which came into effect on May 25, while taking initial steps to inform their customers about the new law and protecting…
On March 2, 2017 Symantec announced the launch of Symantec Ventures - its latest effort to help startups by contributing capital, reducing expenses and accelerating time to market. Per the company, Symantec Ventures is the next step post its partnership with…
Managing enterprise security in today's digital world is becoming increasingly complex with constantly evolving threats. This gives Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) a compelling reason to invest in a security partner who is committed to…
As organisations adopt new applications and approaches to cater to non-traditional touchpoints, they are faced with an explosion of data. It's but natural for organisations to get overwhelmed by the large volumes of data generated daily (sometimes every few seconds)…
On 12 June, 2016 Symantec announced its agreement to acquire Blue Coat for USD 4.65 billion. As a result of this acquisition, the company will now have 385,000 customers, a vast repository of data sources and over 3,000 researchers and…
As a part of its commitment to invest $5 billion in India, Amazon on Tuesday launched its first set of India data centres in Mumbai to cater to cloud computing services here unleashing a new race for the top cloud…
Indian security leaders welcome the move, expected to be finalized later this year, saying it will definitely change the way technology is consumed by organizations, as they expect new innovations to help them tackle future threats more effectively. "It was…
At the 2016 edition of Mint’s Enterprise Tech Summit titled ‘Big Data analytics in an IoT world’, experts discuss potential and barriers to widespread IOT-Big Data value delivery. The panellists included Sanchit Gogia, Chief Analyst and CEO of Greyhound Research.…
Alibaba is reportedly trying to cement its cloud business with plans to open a data center in India this year. According to Indian newspaper Business Line, China's e-commerce titan has plans to boost its cloud computing business in India likely through…
While earlier reports pointed out stating that the Indian Railway Catering and Tourism Corporation’s (IRCTC) website was hacked, turns out, it was not. The IRCTC themselves have come out stating that their website was not hacked, but that some data…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…
Growing companies often look to developing markets for new opportunities; however, finding the right time to enter these markets can be a difficult balance. Recent research from Oxford Economics, sponsored by SAP, suggests that less than one-quarter of U.S. small and medium…
Greyhound Research is featuring in a Facebook chat organized by IBM on the 'Future of Cloud Computing'. Exchange thoughts with our Chief Analyst & Group CEO, Sanchit Vir Gogia, and other esteemed…
The joint venture between Nokia and Siemens is coming to a close with the former buying out the latter for €1.7bn. Nokia Siemens Networks (NSN) was founded in 2007 and saw the two European firms partner on providing networking infrastructure to telecoms companies across the globe.…
After not addressing the flak for years from Governments across the globe, the Department of Information Technology (DIT), Government of India (GoI) has introduced new rules earlier this year. Coined as the Information Technology (IT) Rules, 2011, the notification is…