Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from Code to Scale
  • Blog
  • Publications
  • Resources
  • About
  • Videos
  • Journey
  • Contact
  • Tools
Sign in Subscribe
What is lazy registration and how it is solving the problem of early registration
authentication

What is lazy registration and how it is solving the problem of early registration

Many users switch websites when they are bombarded with lengthy registration forms too early. The solution to this is lazy registration
17 Jan 2022 4 min read
Use of blockchain technology could increase human trust in AI
AI (Artificial Intelligence)

Use of blockchain technology could increase human trust in AI

While Artificial Intelligence (AI) contributes enormously to making human life better, it also raises questions of trustworthiness and reliability. However, blockchain technology can go a long way in increasing human trust in AI-based systems.
17 Jan 2022 5 min read
How Poor Login Concurrency can Impact OTT Platforms' Business
infrastructure

How Poor Login Concurrency can Impact OTT Platforms' Business

With the increase in subscriptions and the number of audiences online, several underlying threats have severely impacted the OTT businesses. One such issue is poor login concurrency. Learn how login concurrency is affecting OTT platforms and how they can overcome this dilemma.
14 Jan 2022 4 min read
The Rise of Profit-Focused Cybercrime on the Cloud
cyberattacks

The Rise of Profit-Focused Cybercrime on the Cloud

Cybercrime is a growing challenge for business and society, but it is still associated with shady hackers motivated by curiosity or financial gain. In reality, profit-focused cybercrime has emerged as a major problem for global businesses.
10 Jan 2022 7 min read
Containers in the Cloud Next on Cybercriminals’ Radar
Cybercrime

Containers in the Cloud Next on Cybercriminals’ Radar

Securing containers in the cloud is the next step organizations should take to ensure a robust security environment and safeguard their crucial business information.
08 Jan 2022 4 min read
QR Codes Exploitation: How to Mitigate the Risk?
awareness

QR Codes Exploitation: How to Mitigate the Risk?

With the rise in QR Code exploits, how can businesses and consumers decipher what a QR Code holds before scanning and mitigate the risks of a malicious QR Code? Find out how!
07 Jan 2022 7 min read
The Future of Cyber Attacks
future

The Future of Cyber Attacks

What is the future of cyber security and how far are we from the next big hack? Find out what experts in this field have to say.
04 Jan 2022 7 min read
3 Steps to Maintain Total Data Visibility
data protection

3 Steps to Maintain Total Data Visibility

Gaining data visibility within an organization is quite beneficial for multiple reasons since the gathered data can be easily used to make more informed business decisions.
30 Dec 2021 3 min read
In-Store Tracking: Is It A Threat To Consumer Privacy?
privacy

In-Store Tracking: Is It A Threat To Consumer Privacy?

New technology being developed at the behest of retail giants may be tempting, but industry experts share their doubts on whether this tracking scheme is right for consumers.
29 Dec 2021 4 min read
Cookie-based vs. Cookieless Authentication: What’s the Future?
authentication

Cookie-based vs. Cookieless Authentication: What’s the Future?

Understand how cookie-based and cookieless authentication methods work. And learn their major differences, advantages, and disadvantages.
29 Dec 2021 6 min read
Understanding PII Compliance: A Key to Enterprise Data Security
compliance

Understanding PII Compliance: A Key to Enterprise Data Security

The security of personal identity and other details is at increasing risk today, with hackers finding new ways to hack into websites. Therefore, enterprises of all sizes must maintain PII compliance to protect the information of the company and its users.
28 Dec 2021 4 min read
DNS Cache Poisoning: Why Is It Dangerous for Your Business
Best Practices

DNS Cache Poisoning: Why Is It Dangerous for Your Business

DNS cache poisoning is an attack that uses changed DNS records to redirect online traffic to a website that is fake and resembles its intended destination.
25 Dec 2021 5 min read
How to Set Up Two-factor Authentication on All Your Online Accounts
MFA

How to Set Up Two-factor Authentication on All Your Online Accounts

2FA is one of the best security methods that use two layers to verify a consumer’s identity. This means, rather than simply entering the password to log into an account, two-factor authentication requires a code to be sent via text message to a consumer's phone number or generated through an app.
25 Dec 2021 7 min read
The Different Ways Artificial Intelligence Solves Real-World Digital Identity Challenges
digital identity

The Different Ways Artificial Intelligence Solves Real-World Digital Identity Challenges

Forward-looking businesses are using artificial intelligence to solve real-world digital identity challenges.
20 Dec 2021 5 min read
How to secure an email address on your website
email

How to secure an email address on your website

Harvesting bots are here to stay. Luckily, there are a few ways to hide your email address from spammers and hackers who constantly mine for the same. One way is through email harvesting. Let's talk about what it is and then explore the various ways to secure your email address.
18 Dec 2021 4 min read
Single-Tenant vs. Multi-Tenant: SaaS Architecture
cloud

Single-Tenant vs. Multi-Tenant: SaaS Architecture

This article comprehensively compares SaaS-based multi-tenant and single-tenant cloud architectures along with their benefits and drawbacks. The comprehension also points out which one to choose based on the organization’s requirements and scenario.
16 Dec 2021 5 min read
Engineering As Marketing: 5 Growth Hack Strategies For Modern Businesses
Strategy

Engineering As Marketing: 5 Growth Hack Strategies For Modern Businesses

Stop relying on traditional marketing tactics and embrace the power of engineering to drive exponential growth for your business.
13 Dec 2021 4 min read
Walking the Fine Line Between Consumer Experience and Privacy
privacy

Walking the Fine Line Between Consumer Experience and Privacy

An organization that handles consumer data ethically stands to gain a considerable edge over competitors through greater access to data, consumer trust, and potential to secure more privacy-conscious consumers.
09 Dec 2021 5 min read
5 Tips for Choosing the Right Password Manager for Your Team
password

5 Tips for Choosing the Right Password Manager for Your Team

When investing in a password manager for business, always prioritize better functionality and security over fancy designs or a complicated interface.
06 Dec 2021 5 min read
Data Governance for Enterprises: Important Principles for Value Generation
Governance

Data Governance for Enterprises: Important Principles for Value Generation

Given that Data Governance has emerged as one of the top priorities for organizations across the globe, these days, it's important to handle data consistently to support business outcomes.
02 Dec 2021 4 min read
Five Ways to Future-Proof Your Data Privacy
privacy

Five Ways to Future-Proof Your Data Privacy

It is hard to know what the data privacy landscape will look like in the future. As government regulations, like GDPR, continue to emerge, companies are more aware than ever of the need to protect sensitive information and gain consent.
30 Nov 2021 4 min read
Current Hybrid Cloud Computing Trends
Hybrid Cloud Computing

Current Hybrid Cloud Computing Trends

A hybrid cloud is a cloud computing environment that uses a mix of on-premises and third-party, public cloud services with orchestration between these platforms. This typically involves a connection from an on-premises data center to a public cloud.
26 Nov 2021 4 min read
Are Passwords Really Dead?
password

Are Passwords Really Dead?

These easy login methods might be the nail in the coffin. We take a brief look at the death of passwords, and how to prepare for a passwordless future.
24 Nov 2021 3 min read
17 Tips to Avoid Shopping Scams on Black Friday & Cyber Monday
tips

17 Tips to Avoid Shopping Scams on Black Friday & Cyber Monday

Many people prefer shopping online these days rather than going to a conventional store. Therefore, securing the data of your customers online is an integral part of protecting the organisation as a whole. Your job is to let them shop with some of the best online shopping tips with confidence.
24 Nov 2021 9 min read
Federated Identity Management vs. SSO: What's The Difference?
SSO

Federated Identity Management vs. SSO: What's The Difference?

Enterprises need to use methods to maximize the use of digital identities for multiple users. Although SSO and FIM are used together, they do not mean the same thing. The main difference between Identity Federation and SSO lies in the range of access.
22 Nov 2021 4 min read
← Newer Posts Page 12 of 18 Older Posts →
Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from Code to Scale © 2025
  • LinkedIn
  • Bluesky
  • X
  • Medium
  • YouTube
  • Instagram
  • Privacy
  • Terms
Powered by Ghost