Deepak Gupta
  • Blog
  • Publications
  • Videos
  • About
  • Contact
Sign in Subscribe
Minimizing Credential Theft With MFA
MFA

Minimizing Credential Theft With MFA

Phishing is a significant business threat and can lead to financial and reputational damages. And minimizing the risk of credential theft through phishing attacks requires a rigorous defense against credential theft
Jan 23, 2023 4 min read
5 Areas Where CIAM Is More Than An IT Responsibility
CIAM

5 Areas Where CIAM Is More Than An IT Responsibility

CIAM becomes prominent and requires cross-functional collaboration and deliberate decision-making
Jan 16, 2023 4 min read
Built-in Authentication Security Mechanisms to Reinforce Platform Security
authentication

Built-in Authentication Security Mechanisms to Reinforce Platform Security

By incorporating built-in platform authentication mechanisms, including MFA and adaptive authentication, you can build the trust of your customers by showing that you care about their safety.
Jan 12, 2023 5 min read
AI and Emotional Intelligence (EI): A Look into the Future
AI (Artificial Intelligence)

AI and Emotional Intelligence (EI): A Look into the Future

AI and emotional intelligence have the potential to revolutionize the way humans interact with technology
Jan 9, 2023 4 min read
CISO’s Guide to Secure Software Development
CISO

CISO’s Guide to Secure Software Development

Developing and following a strategy, use of the right tools and ensuring your entire organization is committed to application security can reduce the chances of a data breach, safeguard the bottom line and protect your business’s reputation.
Jan 5, 2023 4 min read
What is Zero-Day Vulnerability?
cyber security

What is Zero-Day Vulnerability?

Zero-day vulnerabilities can be very dangerous because malicious people can use them to access systems and data without being detected.
Dec 27, 2022 3 min read
How to build a cybersecurity team for startup
startup

How to build a cybersecurity team for startup

How to build a cybersecurity team for a startup, what things to do and how to keep it lean
Dec 21, 2022 1 min read
How to Set up Your Go-to-Market Tech Stack for a Product-Led Company
startup

How to Set up Your Go-to-Market Tech Stack for a Product-Led Company

By investing in the right tech stack for GTM, product-led companies can better understand their customers and drive growth efficiently
Dec 19, 2022 4 min read
Making your Business Cyber Secure - Must do
startup

Making your Business Cyber Secure - Must do

What should you do to make your business cyber secure and steps to improve security
Dec 14, 2022 1 min read
5 Common RESTful API Security Risks and How to Protect Against Them
API

5 Common RESTful API Security Risks and How to Protect Against Them

RESTful APIs are still vulnerable to various security risks. In this article, we will explore five common RESTful API security risks and discuss how to protect against them.
Dec 12, 2022 2 min read
How ChatGPT Will Help Creators To Optimize Social Media
AI (Artificial Intelligence)

How ChatGPT Will Help Creators To Optimize Social Media

Applications of ChatGPT and OpenAI tools to make human-like conversations based on user prompts
Dec 8, 2022 1 min read
What is Password Hashing Algorithm?
password

What is Password Hashing Algorithm?

What are various password hashing algorithms, their pros and cons, and how can they protect users' accounts?
Dec 5, 2022 2 min read
Social Media for Personal Brand
Best Practices

Social Media for Personal Brand

Are you an aspiring personal brand or a business owner without a strong personal presence? In this post, you will learn how to build your personal brand on social media.
Dec 5, 2022 12 min read
Here's Why Passwordless Authentication Is Better for the Business Environment
password

Here's Why Passwordless Authentication Is Better for the Business Environment

Passwordless authentication is becoming more popular among businesses prioritizing their users' and employees' security and digital experience. Here's why.
Nov 28, 2022 4 min read
Why Just Collecting More and More Data Is No Longer Productive
customer data

Why Just Collecting More and More Data Is No Longer Productive

More and more jurisdictions are only introducing new regulatory frameworks to protect consumer data, limiting enterprises in what data they can collect and where they can store it.
Nov 21, 2022 2 min read
5 Things You Can Do in Limited Budget to Improve Your Cybersecurity - GuptaDeepak.com
learning

5 things to improve cybersecurity for startup

As a startup, maintaining cybersecurity is difficult. You have a small team and a small budget, and you probably don't know much about cybersecurity. But there are a few things that you can do!
Nov 17, 2022 1 min read
Are Verifiable Credentials Paving the Way for Reinforced Digital Privacy?
privacy

Are Verifiable Credentials Paving the Way for Reinforced Digital Privacy?

Verifiable credentials ensure individuals have total control over their personal information and need to verify their data instead of providing it.
Nov 14, 2022 4 min read
5 things to keep cybersecurity in check
cybersecurity

5 things to keep cybersecurity in check

As a startup, how can you ensure cybersecurity and improve it?
Nov 9, 2022 1 min read
How To Develop A Product-First Culture In Your Organization
startup

How To Develop A Product-First Culture In Your Organization

The critical mission should be clear to create a product that customers will genuinely want, need, and love.
Nov 7, 2022 8 min read
What Brands Need to Know for Building the Future of Data Compliance?
compliance

What Brands Need to Know for Building the Future of Data Compliance?

Unlike the conventional times when brands used to collect heaps of customer data without their consent, organizations must first build trust in clients before expecting even a bit of detail. Some aspects can help organizations stay ahead of the curve by leveraging digital privacy for compliance.
Oct 31, 2022 3 min read
Public Cloud Risks - Is Your Organization Prepared for Cloud Threats?
cloud

Public Cloud Risks - Is Your Organization Prepared for Cloud Threats?

The rapid adoption of the public and hybrid cloud doesn’t necessarily mean that sensitive information stored on remote servers or shared clouds is secure. This blog highlights the risks associated with the public cloud and how businesses can take timely action to avoid the risks.
Oct 27, 2022 3 min read
Why is cybersecurity so crucial for Startups?
cyber security

Why is cybersecurity so crucial for Startups?

Startups have unique challenges when it comes to cybersecurity. If not taken seriously, they can lose customers and their trust.
Oct 27, 2022 1 min read
The Future of Password Managers and How AI Will Change The Game
password manager

The Future of Password Managers and How AI Will Change The Game

The future of passwords is looking brighter than ever. With the rise of cyber-attacks and data breaches, it's becoming more important to use strong passwords. Password managers are becoming the new norm in today's world.
Oct 26, 2022 3 min read
Implementing Zero Trust? Make Sure You're Doing It Correctly
zero trust

Implementing Zero Trust? Make Sure You're Doing It Correctly

Though zero trust architecture may be potent for reinforcing overall security, chances of sneaking and security breaches aren’t always zero. If not implemented correctly, zero trust could lead to various security and user experience issues and hampers overall business growth.
Oct 24, 2022 3 min read
Cyber Attack - The Anatomy of an Average Hack and The Most Common Entry Points

Cyber Attack - The Anatomy of an Average Hack and The Most Common Entry Points

Today's threat actors have become so sophisticated that they use a systemized modus operandi to target their next victim. This article discusses the anatomy of an average hack and the most common entry points threat actors exploit to execute the attack.
Oct 17, 2022 5 min read
Page 1 of 10 Older Posts →
Deepak Gupta © 2023
  • LinkedIn
  • YouTube
  • Twitter
  • Instagram
  • Medium
Powered by Ghost