Search
Topographical blue lines against a black background

Dheeraj Rawal

Content Marketer

About the author

Dheeraj Rawal

Dheeraj Rawal is a content marketer with T-Systems. He’s passionate about bringing out technology stories for the B2B readers. He’s specialized in creating impactful content around Security, Cloud, RPA, and other cutting-edge technologies.

All articles by Dheeraj Rawal

Business people discussing cyber recovery strategy
2024.06.19 | Security

Why businesses must have a cyber recovery strategy

Explore how a robust cyber recovery strategy can help businesses bounce back quickly after an attack.
Colorful cars lined up in a car showroom
2024.06.19 | Security

How automotives can secure their customer journey?

As customer experience in automotive transforms digitally, how can it be secured against cyber risks?
A knight with a spear and a shield
2024.05.14 | Security

It’s time to go on the cyber security offensive!

Leverage automated penetration testing to detect system vulnerabilities faster than attackers.
Male professional using cybersecurity on computer
2024.03.27 | Security

Why security operations need the AI makeover

Reduce manual dependency, scale security, and improve threat detection with AI and automation.
Interior view of seld-driving car on a street
2024.03.19 | Security

How can automotives secure software-defined vehicles?

With growing cyber-attacks on vehicles, learn how OEMs can implement the right security measures.
Software developers coding and testing applications using cyber-security
2024.01.29 | Security

Attack surface management for businesses

Discover your attack surface and vulnerabilities. Minimize the attack surface with our security experts.
Man working on laptop from home, hybrid working
2023.12.06 | Security

The balancing act between security and agility

Does security suffer if firms adopt agile trends like hybrid working?
Casual office situation in a fancy loft
2023.08.29 | Security

How to Implement a Zero Trust Security Strategy

Discover common pitfalls to avoid when implementing a Zero Trust security strategy and ten essential steps.
Fancy office in warm tones with wooden floors and some office people in it
2023.08.08 | Security

Zero Trust Security in 2023: From Hype to Reality

Find out why the Zero Trust approach is more relevant in today’s world of digital transformation and hybrid work.
Digital cloud world
2023.06.08 | Security

How does microsegmentation slow down attackers?

What is microsegmentation, and how does it protect your enterprise from malicious activity and cyber threats?
Do you visit t-systems.com outside of China? Visit the local website for more information and offers for your country.