Right to privacy is a fundamental right. According to Nasscom’s recent publication ‘The future of internet in India‘; by 2020 – 75% of new internet users growth in India to come from rural areas – […]

Right to privacy is a fundamental right. According to Nasscom’s recent publication ‘The future of internet in India‘; by 2020 – 75% of new internet users growth in India to come from rural areas – […]
Digital transaction and consumer’s online presence Technology advancements has benefited both business and consumer by adopting digital technologies. With increase in adoption of smart phones and smart apps – the fraudulent activities has also exploded. […]
Enterprise need to build trust and are forced to comply with an increasing number of laws and regulations designed to better safeguard their data. Apart from compliance requirements, data breaches also create huge financial impact […]
If you are in process of buying a car – probably you’ll do self research, visit the showrooms, opt for self-drive, experience it and then make decision – whether or not to buy the product […]
Who are social media generations? Social media generations are commonly referred as ‘GenZ’ or ‘iGen’ or ‘Centennials’. The center for generational kinetics define birth years of GenZ as being 1996 to the present. There are […]
Organizations today finding ways and means to utilize both humans and machines in cyber security operations. You should’ve noticed in market most of the cyber security product vendors using terms such as ‘Artificial Intelligence’, ‘Machine […]
What regulators demanding from organizations? According to Article 33 – EU GDPR – “Notification of a personal data breach to the supervisory authority”; In the case of a personal data breach, the controller shall without […]
What is Deepfake Deepfakes are fake videos or audio recordings that look and sound just like the real thing, today anyone can download deepfake software and create convincing fake videos in their spare time. Deepfakes […]
Threat modeling is a process by which organizations can shift their security approach from reactively plugging exploits to proactively and systematically understanding and addressing potential threats in the design stage. This process identifies potential threats […]
Enterprise today are investing in world class security products and do hire talented workforce to keep their business assets safe from any attack vectors. According to IBM XForce Threat Intelligence Index 2019, the growing attack […]