Search
Topographical blue lines against a black background

Dheeraj Rawal

Content Marketer

About the author

Dheeraj Rawal

Dheeraj Rawal is a content marketer with T-Systems. He’s passionate about bringing out technology stories for the B2B readers. He’s specialized in creating impactful content around Security, Cloud, RPA, and other cutting-edge technologies.

All articles by Dheeraj Rawal

A computer programmer working on a laptop
26. September 2025 | Security

Security against ransomware attacks

Find out how modern-day ransomware attacks occur, and how organizations can protect against those with microsegmentation.
A robotic assembly line in a car factory.
01. September 2025 | Security

How can automotive manufacturers secure their production lines?

Discover the preemptive measures auto makers can take to secure their OT-IT infrastructure from advanced attacks.
IT support team members gathered at a desktop.
14. August 2025 | Security

Reset your security posture

Find out vulnerabilities in your IT systems, and take the right and timely measures to fix them.
A businesswoman sits on her desk.
11. April 2025 | Security

Single security platform for CISOs

More security tools create even more complexity. Is it time to switch to an integrated security platform?
An interior view of a factory floor.
18. March 2025 | Security

Cyber security 101 for the manufacturing industry

Find out how manufacturing companies can prepare against attacks with security and resilient solutions.
Young caucasian man touching on-board computer screen in his car.
28. February 2025 | Security

All about OTA and securing it in modern vehicles

Find out how automotive OEMs can protect vehicles against cyber attacks.
Colorful cars lined up in a car showroom
19. June 2024 | Security

How automotives can secure their customer journey?

As customer experience in automotive transforms digitally, how can it be secured against cyber risks?
Business people discussing cyber recovery strategy
19. June 2024 | Security

Why businesses must have a cyber recovery strategy

Explore how a robust cyber recovery strategy can help businesses bounce back quickly after an attack.
A knight with a spear and a shield
14. May 2024 | Security

It’s time to go on the cyber security offensive!

Leverage automated penetration testing to detect system vulnerabilities faster than attackers.
Male professional using cybersecurity on computer
27. March 2024 | Security

Why security operations need the AI makeover

Reduce manual dependency, scale security, and improve threat detection with AI and automation.
Casual office situation in a fancy loft
29. August 2023 | Security

How to Implement a Zero Trust Security Strategy

Discover common pitfalls to avoid when implementing a Zero Trust security strategy and ten essential steps.
Fancy office in warm tones with wooden floors and some office people in it
08. August 2023 | Security

Zero Trust Security in 2023: From Hype to Reality

Find out why the Zero Trust approach is more relevant in today’s world of digital transformation and hybrid work.
Do you visit t-systems.com outside of United Kingdom? Visit the local website for more information and offers for your country.