Search
Topographical blue lines against a black background

Dheeraj Rawal

Content Marketer

About the author

Dheeraj Rawal

Dheeraj Rawal is a content marketer with T-Systems. He’s passionate about bringing out technology stories for the B2B readers. He’s specialized in creating impactful content around Security, Cloud, RPA, and other cutting-edge technologies.

All articles by Dheeraj Rawal

A robotic assembly line in a car factory.

How can automotive manufacturers secure their production lines?

Discover the preemptive measures auto makers can take to secure their OT-IT infrastructure from advanced attacks.
IT support team members gathered at a desktop.

Reset your security posture

Find out vulnerabilities in your IT systems, and take the right and timely measures to fix them.
Female scientists in discussion inside a lab with a tablet.

Why security is healthcare’s real emergency

Find out how the industry can protect its IT assets, data, devices, and networks from cyber attacks.
A businesswoman sits on her desk.

Single security platform for CISOs

More security tools create even more complexity. Is it time to switch to an integrated security platform?
Young caucasian man touching on-board computer screen in his car.

All about OTA and securing it in modern vehicles

Find out how automotive OEMs can protect vehicles against cyber attacks.
An interior view of a factory floor.

Cyber security 101 for the manufacturing industry

Find out how manufacturing companies can prepare against attacks with security and resilient solutions.
Integrated retail management system for omnichannel retailing in modern business environment

Retailers’ guide to stronger cyber security

Find out how retailers can protect their networks, customer data, POS systems, endpoints, and IT resources.
Colleagues working together in an office setting

How to build a security culture

What is cyber security culture and how can organizations build one to improve security posture and resilience?
A factory with large chimneys emitting smoke.

OT security for critical infrastructure

Safeguard essential operations with a robust defense against cyber threats.
Business people discussing cyber recovery strategy

Why must businesses have a cyber recovery strategy?

Explore how a robust cyber recovery strategy can help businesses bounce back quickly after an attack.
Do you visit t-systems.com outside of India? Visit the local website for more information and offers for your country.