Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from Code to Scale
  • Blog
  • Publications
  • Resources
  • About
  • Videos
  • Journey
  • Contact
  • Tools
Sign in Subscribe
AI and Emotional Intelligence (EI): A Look into the Future
AI (Artificial Intelligence)

AI and Emotional Intelligence (EI): A Look into the Future

AI and emotional intelligence have the potential to revolutionize the way humans interact with technology
09 Jan 2023 4 min read
CISO’s Guide to Secure Software Development
CISO

CISO’s Guide to Secure Software Development

Developing and following a strategy, use of the right tools and ensuring your entire organization is committed to application security can reduce the chances of a data breach, safeguard the bottom line and protect your business’s reputation.
05 Jan 2023 4 min read
What is Zero-Day Vulnerability?
cyber security

What is Zero-Day Vulnerability?

Zero-day vulnerabilities can be very dangerous because malicious people can use them to access systems and data without being detected.
27 Dec 2022 3 min read
How to build a cybersecurity team for startup
startup

How to build a cybersecurity team for startup

How to build a cybersecurity team for a startup, what things to do and how to keep it lean
21 Dec 2022 1 min read
How to Set up Your Go-to-Market Tech Stack for a Product-Led Company
startup

How to Set up Your Go-to-Market Tech Stack for a Product-Led Company

By investing in the right tech stack for GTM, product-led companies can better understand their customers and drive growth efficiently
19 Dec 2022 4 min read
Making your Business Cyber Secure - Must do
startup

Making your Business Cyber Secure - Must do

What should you do to make your business cyber secure and steps to improve security
14 Dec 2022 1 min read
5 Common RESTful API Security Risks and How to Protect Against Them
API

5 Common RESTful API Security Risks and How to Protect Against Them

RESTful APIs are still vulnerable to various security risks. In this article, we will explore five common RESTful API security risks and discuss how to protect against them.
12 Dec 2022 2 min read
How ChatGPT Will Help Creators To Optimize Social Media
AI (Artificial Intelligence)

How ChatGPT Will Help Creators To Optimize Social Media

Applications of ChatGPT and OpenAI tools to make human-like conversations based on user prompts
08 Dec 2022 1 min read
What is Password Hashing Algorithm?
password

What is Password Hashing Algorithm?

What are various password hashing algorithms, their pros and cons, and how can they protect users' accounts?
05 Dec 2022 2 min read
Social Media for Personal Brand
Best Practices

Social Media for Personal Brand

Are you an aspiring personal brand or a business owner without a strong personal presence? In this post, you will learn how to build your personal brand on social media.
05 Dec 2022 12 min read
Here's Why Passwordless Authentication Is Better for the Business Environment
password

Here's Why Passwordless Authentication Is Better for the Business Environment

Passwordless authentication is becoming more popular among businesses prioritizing their users' and employees' security and digital experience. Here's why.
28 Nov 2022 4 min read
Why Just Collecting More and More Data Is No Longer Productive
customer data

Why Just Collecting More and More Data Is No Longer Productive

More and more jurisdictions are only introducing new regulatory frameworks to protect consumer data, limiting enterprises in what data they can collect and where they can store it.
21 Nov 2022 2 min read
5 Things You Can Do in Limited Budget to Improve Your Cybersecurity - GuptaDeepak.com
learning

5 things to improve cybersecurity for startup

As a startup, maintaining cybersecurity is difficult. You have a small team and a small budget, and you probably don't know much about cybersecurity. But there are a few things that you can do!
17 Nov 2022 1 min read
Are Verifiable Credentials Paving the Way for Reinforced Digital Privacy?
privacy

Are Verifiable Credentials Paving the Way for Reinforced Digital Privacy?

Verifiable credentials ensure individuals have total control over their personal information and need to verify their data instead of providing it.
14 Nov 2022 4 min read
5 things to keep cybersecurity in check
cybersecurity

5 things to keep cybersecurity in check

As a startup, how can you ensure cybersecurity and improve it?
09 Nov 2022 1 min read
How To Develop A Product-First Culture In Your Organization
startup

How To Develop A Product-First Culture In Your Organization

The critical mission should be clear to create a product that customers will genuinely want, need, and love.
07 Nov 2022 8 min read
What Brands Need to Know for Building the Future of Data Compliance?
compliance

What Brands Need to Know for Building the Future of Data Compliance?

Unlike the conventional times when brands used to collect heaps of customer data without their consent, organizations must first build trust in clients before expecting even a bit of detail. Some aspects can help organizations stay ahead of the curve by leveraging digital privacy for compliance.
31 Oct 2022 3 min read
Public Cloud Risks - Is Your Organization Prepared for Cloud Threats?
cloud

Public Cloud Risks - Is Your Organization Prepared for Cloud Threats?

The rapid adoption of the public and hybrid cloud doesn’t necessarily mean that sensitive information stored on remote servers or shared clouds is secure. This blog highlights the risks associated with the public cloud and how businesses can take timely action to avoid the risks.
27 Oct 2022 3 min read
Why is cybersecurity so crucial for Startups?
cyber security

Why is cybersecurity so crucial for Startups?

Startups have unique challenges when it comes to cybersecurity. If not taken seriously, they can lose customers and their trust.
27 Oct 2022 1 min read
The Future of Password Managers and How AI Will Change The Game
password manager

The Future of Password Managers and How AI Will Change The Game

The future of passwords is looking brighter than ever. With the rise of cyber-attacks and data breaches, it's becoming more important to use strong passwords. Password managers are becoming the new norm in today's world.
26 Oct 2022 3 min read
Implementing Zero Trust? Make Sure You're Doing It Correctly
zero trust

Implementing Zero Trust? Make Sure You're Doing It Correctly

Though zero trust architecture may be potent for reinforcing overall security, chances of sneaking and security breaches aren’t always zero. If not implemented correctly, zero trust could lead to various security and user experience issues and hampers overall business growth.
24 Oct 2022 3 min read
Cyber Attack - The Anatomy of an Average Hack and The Most Common Entry Points

Cyber Attack - The Anatomy of an Average Hack and The Most Common Entry Points

Today's threat actors have become so sophisticated that they use a systemized modus operandi to target their next victim. This article discusses the anatomy of an average hack and the most common entry points threat actors exploit to execute the attack.
17 Oct 2022 5 min read
What is Federated SSO (Single Sign-On)?
SSO

What is Federated SSO (Single Sign-On)?

With fed SSO, businesses can bridge the authentication gap between multiple platforms and enable users to access services without needing a separate login at the partner platform. This blog explains fed SSO and how businesses should leverage it.
14 Oct 2022 3 min read
Are you ready to start a new business?
startup

Are you ready to start a new business?

Many people like starting a business because they feel they have a great idea or can do something better than someone else. Do these people consider the challenges of starting a business? I want to explain the reality of starting a business, in this video. View this post on Instagram
11 Oct 2022
Cloud Security: An Overview of Challenges and Best Practices
cyber security

Cloud Security: An Overview of Challenges and Best Practices

Cloud systems are frequently shared, and identity management, privacy, and access control are highly critical for cloud security.
26 Sep 2022 4 min read
← Newer Posts Page 9 of 18 Older Posts →
Deepak Gupta | AI & Cybersecurity Innovation Leader | Founder's Journey from Code to Scale © 2025
  • LinkedIn
  • Bluesky
  • X
  • Medium
  • YouTube
  • Instagram
  • Privacy
  • Terms
Powered by Ghost