Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher
  • Blog
  • Publications
  • Videos
  • About
  • Contact
Sign in Subscribe
Securing the cloud – the peerless role of biometrics
cloud

Securing the cloud – the peerless role of biometrics

While businesses embark on a digital transformation journey, cloud adoption is undoubtedly the cornerstone for new-age enterprises.
Jul 10, 2022 3 min read
Managing Privacy and Compliance in a Cookieless World
compliance

Managing Privacy and Compliance in a Cookieless World

Businesses need to gear up for the new reality and ensure they create a seamless user experience by adhering to privacy and compliances while delivering a perfect harmony.
Jul 8, 2022 4 min read
Fronton Botnet Attacks: Why Enterprises Should Worry
bot

Fronton Botnet Attacks: Why Enterprises Should Worry

This article discusses the aspect of botnet attacks and why businesses should put their best efforts into minimizing the risk.
Jul 4, 2022 3 min read
M2M Authorization: Authenticate Apps, APIs, and Web Services
authentication

M2M Authorization: Authenticate Apps, APIs, and Web Services

How can you ensure APIs, web services, and business systems communicate and access the information securely without human intervention? The answer is machine-to-machine (M2M) authorization.
Jul 1, 2022 5 min read
What Makes Zero Trust Better And Different From Traditional Security
zero trust

What Makes Zero Trust Better And Different From Traditional Security

Enterprises have already started to embrace zero trust security over traditional security since it offers improved security while simultaneously improving flexibility and reducing complexity.
Jun 26, 2022 3 min read
Top 7 Google Drive Security Mistakes Companies Keep Making
Best Practices

Top 7 Google Drive Security Mistakes Companies Keep Making

In this blog post we look at the factors that affect your security and how you can use encryption to protect data in Google Drive and how you can strengthen your overall security.
Jun 13, 2022 4 min read
Should Artificial intelligence (AI) Be Regulated?
AI (Artificial Intelligence)

Should Artificial intelligence (AI) Be Regulated?

The rapid progression of artificial intelligence (AI) technology has left researchers and governments debating the need for a regulatory framework.
Jun 6, 2022 5 min read
11 Tips for Keeping Information Safe on the Internet
Best Practices

11 Tips for Keeping Information Safe on the Internet

Protect your online activity and personal details to avoid identity fraud and cyber crimes - Tips on how to stay safe online and prevent identity theft, credit card fraud, malware, malicious sites, and scams.
May 30, 2022 4 min read
Will Decentralized Auth Change the Perception of Consumer Identities in 2022?
authentication

Will Decentralized Auth Change the Perception of Consumer Identities in 2022?

Whether we talk about inappropriate data collection or a loophole in managing consumer identities, anything could lead to compromised sensitive information. Here’s where the concept of decentralized authentication in identity management comes into play.
Apr 29, 2022 3 min read
Is the Rise of Machine Identity Posing a Threat to Enterprise Security?
digital identity

Is the Rise of Machine Identity Posing a Threat to Enterprise Security?

Cybercriminals are always on the hunt to exploit a loophole in the overall security mechanism in the digital world where machine-to-machine communication is the new normal. It’s no longer enough to assume services/devices accessing sensitive data can be trusted.
Apr 28, 2022 4 min read
No Industry is Above or Below the Radar: Seeing Value in Your Data
data protection

No Industry is Above or Below the Radar: Seeing Value in Your Data

Big or small, business intelligence professionals know that their data is worth a lot more than most businesses are realizing.
Apr 27, 2022 4 min read
How Lapsus$ Breached Okta and What Organizations Should Learn
breach

How Lapsus$ Breached Okta and What Organizations Should Learn

Businesses have to be extra vigilant in safeguarding customer data. Minor mistakes can cause a massive data breach, violating data privacy regulations and attracting penalties from regulatory authorities.
Apr 25, 2022 5 min read
Everyone's and identity driven company (even if you aren't one)
digital identity

Everyone's and identity driven company (even if you aren't one)

What does it mean if everyone’s an identity driven company? Before answering that question, let’s define what it means to be an identity-driven company.
Apr 14, 2022 4 min read
Decentralized identity using blockchain
blockchain

Decentralized identity using blockchain

Decentralized identity is becoming a reality for users of blockchain-based applications, and it’s thanks to the proliferation of unique, verifiable identifiers.
Apr 7, 2022 5 min read
API Security: 5 tips to ensure third party API security in your organization
API

API Security: 5 tips to ensure third party API security in your organization

API security plays a crucial role in ensuring that third parties can only access the API functionality and resources they are allowed to.
Apr 4, 2022 6 min read
How Cloud Governance Allows Businesses to Become Compliant Superheroes
compliance

How Cloud Governance Allows Businesses to Become Compliant Superheroes

In the battle of the old vs. the new, it is evident that traditional identity and access management (IAM) solutions are gradually getting phased out by cloud solutions. Hence, there is a need to shift to cloud-based identity governance and administration (IGA) solutions.
Mar 31, 2022 4 min read
Navigating a Corporate Data Breach
breach Featured

Navigating a Corporate Data Breach

Cybersecurity is not just a technical IT problem. As business people, we all have a role to play in protecting our companies and the data they store. Here are 6 things you should consider if your company has suffered a data breach.
Mar 28, 2022 5 min read
How LoginRadius Creates a Perfect Harmony of UX and Security
UX

How LoginRadius Creates a Perfect Harmony of UX and Security

Enterprises must be aware that the secret to success lies in quickly identifying and eliminating any troubles and pain points that occur when consumers interact with their organization. A robust CIAM like LoginRadius helps eliminate security and user experience challenges like a breeze.
Mar 24, 2022 4 min read
The Strategy of Champions – Customer Feedback: Why & How?
Strategy

The Strategy of Champions – Customer Feedback: Why & How?

Leverage customer feedback strategies and features wherever you find them – it’s what you, your brand, and your customers deserve
Mar 21, 2022 7 min read
It's a Jungle in the Cloud: Why Serverless Is The Next Big Thing For Developers
serverless

It's a Jungle in the Cloud: Why Serverless Is The Next Big Thing For Developers

Serverless is undeniably the future of building and operating cloud-native applications since it offloads all management responsibilities and operations tasks, including scheduling, scaling, provisioning, and more.
Mar 18, 2022 3 min read
Multi-Brand Ecommerce: Creating a One-Brand Experience Using SSO
SSO

Multi-Brand Ecommerce: Creating a One-Brand Experience Using SSO

SSO bridges the gap between multiple interconnected platforms and cuts the need for re-authentication for a consumer. Let’s understand how SSO is paving the path for the next generation of e-commerce giants to deliver rich multi-brand experiences across their platforms.
Mar 15, 2022 4 min read
Cyber Security Working From Home
Remote work

Cyber Security Working From Home

The importance of cyber security working from home has become more than evident with the recent pandemic outbreak.
Mar 7, 2022 12 min read
What Software Developers and IT Pros should Know about Making the Switch to Identity
software

What Software Developers and IT Pros should Know about Making the Switch to Identity

The increasing number of account fraud and consumer data breaches indicate an immediate need for a robust mechanism to mitigate the risk.
Feb 28, 2022 4 min read
How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access
MFA

How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access

To verify the identity of clients, many security-minded organisations use multi-factor authentication. The most popular approach is to send a code via SMS text message to customers, which the customer then enters on the website or app. But what if you drive and have no mobile phone service?
Feb 25, 2022 6 min read
Credential Stuffing: How To Detect And Prevent It (Updated)
authentication

Credential Stuffing: How To Detect And Prevent It (Updated)

Credential stuffing is a cybersecurity vulnerability in which hackers target web infrastructures and take over user accounts using stolen credentials. When hackers use organisational credentials to login and hijack user accounts, the threat gets further elevated.
Feb 16, 2022 7 min read
← Newer Posts Page 3 of 10 Older Posts →
Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher © 2023
  • LinkedIn
  • YouTube
  • Twitter
  • Instagram
  • Medium
Powered by Ghost