Deepak Gupta - Tech Entrepreneur

Deepak Gupta - Tech Entrepreneur

Co-founder/CTO @LoginRadius. Securing 1B+ IDs worldwide. CyberSecurity innovator and author. Developer at heart. Infrastructure Architect.
Oct
21
Role of CIAM in digital transformation

Role of CIAM in digital transformation

Digital transformation has become the need of the hour for every consumer-focused business today
4 min read
Oct
21
Don't Forget About Spooling!

Don't Forget About Spooling!

Spooling, the mechanism used by input and output devices to temporarily hold data before its execution, is a normal function
4 min read
Oct
18
How AI will Transform Software Development - Benefits of AI in Software Development

How AI will Transform Software Development - Benefits of AI in Software Development

As we talked about the Impact of AI (Artificial Intelligence) in Software Development in Part-1, now we'll look at how
2 min read
Oct
16
Tips for a Successful DevSecOps Life Cycle

Tips for a Successful DevSecOps Life Cycle

A DevOps implementation, if done correctly, can do wonders for any organization that’s on the hunt for efficiency, productivity,
4 min read
Oct
12
Top 5 Misconceptions about Small Business Cybersecurity

Top 5 Misconceptions about Small Business Cybersecurity

Data security is increasingly becoming a big problem for businesses of all kinds. Of course, as the world becomes increasingly
6 min read
Oct
06
Are You Doing Enough to Address IoT Security Vulnerabilities

Are You Doing Enough to Address IoT Security Vulnerabilities

The Internet of Things (IoT) is not going away anytime soon, and neither are cyber criminals and data breaches! Speaking of which, are you doing enough to address IoT security vulnerabilities?
4 min read
Oct
04
How AI will Transform Software Development - Impact of AI on software development

How AI will Transform Software Development - Impact of AI on software development

As AI is already helping human developers at every stage of the development process, software development will only improve with AI.
4 min read
Oct
01
Poly Hack: Network Offers' White Hat' A $500K Bug Bounty For Highlighting Security Loophole

Poly Hack: Network Offers' White Hat' A $500K Bug Bounty For Highlighting Security Loophole

In a surprising development around the Poly network hack, the officials offered the hacker to keep as much as $500K
2 min read
Sep
13
Identity Theft - Explicit Increase in Financial Crimes

Identity Theft - Explicit Increase in Financial Crimes

The recent digitalization of business functions and remote working operations is the primary reason behind identity theft. There are different
7 min read
Sep
11
How CISOs are Building a Modern Cybersecurity Partnership

How CISOs are Building a Modern Cybersecurity Partnership

There has been an ongoing dialogue regarding the benefit of cybersecurity partnerships, with chief information security officers at the forefront of the conversations.
4 min read