Skip to content
Saturday, March 6, 2021
Latest posts
  • State sponsored attacker operating from China
  • Chartered Bank focuses on eliminating risk
  • Oxfam Australia hit by data breach
  • Enterprise intelligence for India in 2021 and beyond
  • The global CIO who manages teams in different locations
CIO Tech Asia
  • Technology
  • Security
  • Government
  • Telco
  • Data Centres
  • Resources
    • Podcasts
    • Content Centre
      • BeyondTrust Content Centre
      • BlackBerry Content Centre
    • Roundtable Session
    • White Papers
    • Executive Insight
    • Featured Content
  • Events
  • Subscribe

Foxconn

India holds up imports of Chinese tech

July 10, 2020 CIO Tech Team

Several companies such as Apple and Dell have been battling to free stuck shipments. By Aditya Kalra and Sankalp Phartiyal NEW DELHI (Reuters) – India’s additional scrutiny of imports from China has disrupted operations at plants owned by Apple supplier Foxconn in southern India, three sources told Reuters, and other…

Read More
Latest News, TechnologyApple, China, Foxconn, India, XiaomiLeave a comment

Upcoming Events

  1. Virtual Roundtable Session

    March 16 @ 10:30 am - 11:30 am
  2. Virtual Roundtable Session

    March 17 @ 2:00 pm - 3:00 pm
  3. Virtual Roundtable Session

    March 18 @ 10:00 am - 11:00 am

View All Events

Recent Posts

  • State sponsored attacker operating from China
    State sponsored attacker operating from China
  • Chartered Bank focuses on eliminating risk
    Chartered Bank focuses on eliminating risk
  • Oxfam Australia hit by data breach
    Oxfam Australia hit by data breach
  • Enterprise intelligence for India in 2021 and beyond
    Enterprise intelligence for India in 2021 and beyond
  • The global CIO who manages teams in different locations
    The global CIO who manages teams in different locations

White Papers From Our Sponsors

  • Digital Transformation is the ‘new-normal’ for staying competitive
    Digital Transformation is the ‘new-normal’ for staying competitive
  • Continuous Application Security with HCL AppScan
    Continuous Application Security with HCL AppScan
  • BigFix Compliance – Ensuring continuous compliance of security and regulatory policies
    BigFix Compliance – Ensuring continuous compliance of security and regulatory policies
  • 5 Steps to alleviate endpoint management tool Sprawl
    5 Steps to alleviate endpoint management tool Sprawl

Subscribe

Connect With Us

 

Quick Links

 
  • About
  • Advertise
  • Contact Us
  • Site Map
  • Privacy Policy

Latest Tweets

Tweets by @asia_cio

Copyright ©CIO TECH ASIA, a Media Corp Group Pty Ltd company. All rights reserved

Get the Latest Tech News and Insights

Sign up to receive the weekly
CIO Tech Asia e-newsletter direct to your inbox

robot

    We respect your privacy, by entering your information you will receive our e-newsletter along with updates on the latest podcasts, videos, interviews and events. For further information on how we process and monitor your personal data click here

    The world is shifting towards a new normal. In these times of uncertainty, how does an organization ensure business continuity, while keeping their workforce safe and productive? See how BlackBerry works for a global organization to provide Business Continuity, Unified Endpoint Security and Management, and, for the personnel Working from Home, the tools to stay secure and productive – during and after the pandemic.

    Jouve takes data protection to a new level, leveraging artificial intelligence for data protection. This is the story of a digital firm that transformed its endpoint defense strategy from reactivity to proactive prevention by partnering with BlackBerry.

    This customer facing video succinctly describes the problems and business challenges related to endpoint security. Partners can share this with customers and prospects.

    Gain access to content

    If you would like to gain full access to the BlackBerry content centre and view all of the latest videos, industry reports, whitepapers, interviews and case studies please provide your details below.

    Once you submit the form, please check your email and click on the link.


      We respect your privacy, by entering your information you will receive our e-newsletter along with updates on the latest podcasts, videos, interviews and events. Your information will also be passed on to the paid sponsor of this page. For further information on how we process and monitor your personal data click here.

      Gain access to content

      If you would like to gain full access to the Beyond Trust content centre and view all of the latest videos, industry reports, whitepapers, interviews and case studies please provide your details below.

      Once you submit the form, please check your email and click on the link.


        We respect your privacy, by entering your information you will receive our e-newsletter along with updates on the latest podcasts, videos, interviews and events. Your information will also be passed on to the paid sponsor of this page. For further information on how we process and monitor your personal data click here.

        Thank you for your details. Please click on the link sent to you via email to gain access to the BeyondTrust Content Centre

        Stay updated with the latest news, articles, videos, interviews and events by subscribing to our newsletter.

          We use cookies and similar technologies to recognize your visits and preferences, as well as to measure the effectiveness of campaigns and analyse traffic. To learn more about cookies, including how to disable them, view our Cookie Policy.