Tag Archive for: demand

TCS Delivers Strong Q3; Rev Crosses $7 bn Propelled by Cloud Demand and Market Share Gains


–          Revenue Growth of +13.5% YoY in CC; 8.4% YoY in USD

–          Growth led by North America & UK (+15.4% YoY in CC)

–          Operating Margin at 24.5%; Net Margin at 18.6%

–          IT Services Attrition trending down: LTM Attrition at 21.3%

–          Board Announces Dividend of `75/share Including Special Dividend of `67/share
 

MUMBAI, January 9, 2023: Tata Consultancy Services (BSE: 532540, NSE: TCS) reported its consolidated financial results according to Ind AS and IFRS, for the quarter ending December 31, 2022.


Highlights of the Quarter Ended December 31, 2022

  • Revenue at 7.075 billion, +8.4% YoY, +13.5% YoY in constant currency
  • Order Book at $7.8 billion | Book to Bill at 1.1
  • Operating Margin at 24.5%; contraction of 0.5% YoY
  • Net Income at $1.318 billion, +1.1% YoY | Net Margin at 18.6%
  • Net Cash from Operations at $1.354 billion ie 102.8% of Net Income
  • Net headcount addition of -2,197 |Workforce strength: 613,974
  • Diverse and inclusive workplace: Women in the workforce: 35.7% | 153 Nationalities
  • Building a G&T workforce: 11.4 million learning hours clocked | 1.3 million competencies acquired
  • LTM IT Services attrition rate at 21.3%
  • Total Dividend per share of `75 per share including `67 as special dividend
    Record date 17/01/2023 | Payment date 03/02/2023
  • Total Shareholder Payout of `33,297crore Year till Date


Rajesh Gopinathan, Chief Executive Officer and Managing Director
, said: “We are pleased with our strong growth in a seasonally weak quarter, driven by cloud services, market share gains through vendor consolidation, and continued momentum in North America and UK. The sustained strength of demand for our services is a validation of the value we provide to our clients in helping them differentiate themselves, while enhancing their competitiveness. Looking ahead, and beyond current uncertainties, our longer-term growth outlook remains robust.”
 

N Ganapathy Subramaniam, Chief Operating Officer and Executive Director, said: “As I look back at 2022, it’s gratifying to see the privileged partnership that we continue to enjoy with our clients globally. In a hybrid working model we delivered many complex…

Source…

Police deny ransom demand of Rs 200 crore in cryptocurrency as server remains down for 6th day


Delhi AIIMS

All India Institutes of Medical Sciences (AIIMS).

Photo : IANS

New Delhi: The server of All India Institute of Medical Sciences (AIIMS), Delhi remained affected for the sixth consecutive day on Monday. The hackers, meanwhile, have allegedly demanded an estimated Rs 200 crore in cryptocurrency from the hospital authorities, official sources said on Monday.

However, the Delhi Police has claimed that no ransom demand, as being quoted by certain sections of the media, has been brought to the notice by the AIIMS authorities.

Meanwhile, the AIIMS computer facility on Monday wrote to all departments of the institute to make a backup of their files which are connected to the institute’s networks as they will have to be formatted and cleaned in the aftermath of the ransomware attack.

Reports said that it is being feared that the data of around 3 to 4 crore patients could have been compromised due to the hacking detected on Wednesday morning, reported PTI.

On Monday, AIIMS management informed that data restoration and server cleaning are in progress and the authorities are taking time due to the volume of data and large number of servers for hospital services.

“Measures are being taken for cyber security. All hospital services, including outpatient, in-patient, and laboratories continued to run on manual mode,” informed the hospital authorities.

On the other hand, Patient care services, including emergency, outpatient, inpatient, and laboratory are being managed manually as the server continued to remain down on Monday.

The India Computer Emergency Response Team (CERT-IN), Delhi Police, and representatives of the Ministry of Home Affairs have started an investigation into the ransomware attack, reported PTI.

On November 25, an extortion and cyber terrorism case was registered by the Intelligence Fusion and Strategic Operations (IFSO) unit of the Delhi Police.

At present, internet services have been blocked on computers at the hospital on the recommendations of the investigating agencies, said officials.

It may be worth mentioning here that the AIIMS server has stored data of several VIPs, including former prime ministers, ministers, bureaucrats, and judges.

“Hackers have…

Source…

Demand for cybersecurity workers – WNYT.com NewsChannel 13


The station representative that can assist any person with disabilities with issues related to the content of the public file is Maryann Ryan. She can be contacted at [email protected] or 518-207-4880.

This website is not intended for users located within the European Economic Area.

© WNYT-TV, LLC

A Hubbard Broadcasting Company

Source…

Optus hackers demand $US1m to keep data secret | Information Age


Optus suffered a major security breach. Image: Shutterstock

Hackers claiming to be behind the breach of personal information about millions of Optus customers have demanded the company pay US$1 million in cryptocurrency Monero to stop them from selling the data.

News of an Optus breach broke during last Thursday’s National Day of Mourning with the telco saying someone had accessed data on “at most” 9.8 million users including names, dates of birth, phone numbers, email addresses, physical addresses, driver’s licence, and passport numbers.

A hacking forum user claiming to be the Optus attacker soon posted about the breach, saying they had a database containing personal information of 11.2 million Optus users.

The attacker gave Optus one week to pay the extortion price before customer data would go on sale.

Optus said it has been in contact with relevant authorities including the Australian Federal Police and the Office of the Australian Information Commissioner.

Journalists like Jeremy Kirk accessed a sample data set and found enough unique details – that is, information that hadn’t been previously disclosed in breaches – to verify the data as likely being sourced from Optus.

Kirk then shared his interaction with the hacker who explained that they scraped the data from an unauthenticated, internet connecting API.

The attacker ran a script enumerating through the ‘contactid’ field, scraping customer data one-by-one until the high volume of requests eventually triggered a security alert.

Optus has refused to comment on the technical aspect of the attack, instead saying it was the work of a “sophisticated” attacker who used European IP addresses to mask their real location.

In a statement sent to the media on Saturday evening, Optus said the Australian Federal Police had advised to not comment on “certain aspects of the investigation, including…

Source…