All Posts (2214)

Sort by

Digital Personal Data Protection Act

12744915078?profile=RESIZE_710xIn today's digital age, the importance of safeguarding personal data has become increasingly paramount. The implementation of data protection laws, such as the Digital Personal Data Protection Act (DPDPA), represents a crucial step towards ensuring t

Read more…
Views: 62
Comments: 0

Gen AI & Deepfake In Overall Security

The rapid integration of AI, notably Gen AI, across sectors like manufacturing, finance, and technology is revolutionizing operations with advanced analytics and tailored services. However, this transformation underscores heightened concerns surround

Read more…
Views: 17
Comments: 0

Most Dangerous Attack Techniques

12744923080?profile=RESIZE_710xEmerging attack techniques in 2024 have profoundly impacted the cybersecurity landscape. The shift to cloud environments has made cloud security a critical focus. Attackers often exploit misconfigured cloud resources and stolen credentials to gain in

Read more…
Views: 17
Comments: 0

A program that involves several processes to run simultaneously without having to wait for completion of execution for previous ones is called Asynchronous programming. When data driven tasks are done sequentially then it might spoil the user experie

Read more…

The Cybersecurity Vault - episode 34, with guest Chase Cunningham.

We take a hard look at when organizations make big cybersecurity mistakes, how the attackers see those as opportunities, and how they will maneuver to take advantage.

 

Chase’s LinkedIn

Read more…

Last month, we were thrilled to have Bruce Schneier join us at the CISO Platform Summit 2024 in a fireside chat with Bikash Barai.

Bruce is one of the foremost cryptographers and a leading mind in cybersecurity. Often referred to as the "security guru

Read more…

As the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity!   Pooja Shimpi, Sameer Gemawat, and I discuss strategies leaders can use to promote a robust security mindset and a security-first approach withi

Read more…