Blog

Partner Content
How to Choose the Right Vendor for Your Aadhaar Data Vault

Authenticating agencies (AUAs, KUAs, Sub-AUAs) that fail to comply with UIDAI’s Aadhaar Data Vault mandate will attract penal action and hefty financial penalties. 

Partner Content
India’s NEW Personal Data Protection Law is almost here. Are you ready?

With the Indian Government releasing the Justice BN Srikrishna Committee of Experts Report on Data Protection recently, a new law in the form of the Personal Data Protection Bill, 2018, is all set to soon become a reality in India.

Partner Content
Email-borne cyber attacks: A constant security threat

The sheer widespread usage of e-mails, both on a personal and on a professional basis by sheer billions of people, means hackers and cyber criminals can target multiple people at once.

Partner Content
Unstructured data: The unseen dangers

Unstructured data refers to raw and organized data that cannot be stored in predefined relationship structures.

Partner Content
Tailgating: Security Risks Involved

Let’s visualize another scenario. A group of employees go down to have lunch. One of them swipes their own card and holds it open for everyone to go through. He doesn’t notice that someone else has slipped inside while the door was open.

Partner Content
POS security vulnerabilities for retail industry

One of the most publicized POS breaches happened with American retailer, Target in 2013 where 41 million customer payment card accounts and contact information for more than 60 million Target customers were affected.

Partner Content
Companies Collect More Data Than They Can Analyse

With GDPR on most organisations’ minds, now is the perfect time to look at just how confident organizations are in protecting the data they collect. 

Partner Content
Is Your Data Hackproof?

Two Canadian banks, The Bank of Montreal and CIBC-owned Simplii Financial, were targeted by hackers who managed to get access to the personal information of thousands of their customers. 

Partner Content
Blockchain: A brief introduction

A blockchain is a type of ledger containing records arranged in data blocks that use cryptographic validation to link together.

Partner Content
What is the mystery about the Deep and Dark Web?

Deep Web. Dark Web. Ransomware. Tor. Illegal activities. Bitcoin.

Partner Content
Using data governance and compliance to your advantage

A proper data governance and compliance policy benefits an organization in more ways than just making them compliant with the latest norms.

Partner Content
How to identify, prevent and recover from cryptojacking attacks

Cryptojacking is a sneaky but extremely effective way for hackers to get their desired results in exactly the surreptitious, stealthy way they desire.