cyber security

Oct
21
Don't Forget About Spooling!

Don't Forget About Spooling!

Spooling, the mechanism used by input and output devices to temporarily hold data before its execution, is a normal function
4 min read
Oct
12
Top 5 Misconceptions about Small Business Cybersecurity

Top 5 Misconceptions about Small Business Cybersecurity

Data security is increasingly becoming a big problem for businesses of all kinds. Of course, as the world becomes increasingly
6 min read
Oct
01
Poly Hack: Network Offers' White Hat' A $500K Bug Bounty For Highlighting Security Loophole

Poly Hack: Network Offers' White Hat' A $500K Bug Bounty For Highlighting Security Loophole

In a surprising development around the Poly network hack, the officials offered the hacker to keep as much as $500K
2 min read
Aug
23
9 Ransomware Prevention Tips And Best Practices for 2021

9 Ransomware Prevention Tips And Best Practices for 2021

Ransomware is a form of malicious software that uses encryption to prevent users from accessing their data. Usually, a ransom
5 min read
Jul
24
Why IAM Architects Prescribe Enterprise Application Security

Why IAM Architects Prescribe Enterprise Application Security

Since the wave of digitization is sweeping businesses, managing an enterprise has become a much easier task. Enterprises now utilize
3 min read
May
31
Consumer Identity Management is an important security tool for an IoT ecosystem

Consumer Identity Management is an important security tool for an IoT ecosystem

The Internet of Things (IoT) is creating an exciting new world of new and improved experiences for all. It necessitates
4 min read
May
17
Guide to Digital Identity - Part 4 (Single Sign-on)

Guide to Digital Identity - Part 4 (Single Sign-on)

Follow my blog with BloglovinWhen it comes to Digital Identity concepts, Authentication is one of the most important. The previous
5 min read
Apr
29
Curating a Framework To Defend Against Phishing Attacks

Curating a Framework To Defend Against Phishing Attacks

Many businesses are facing challenges in dealing with phishing attacks. Here’s an insightful read to defend against phishing attacks
4 min read
Apr
22
How To Protect Your Data In A Multi-Cloud Environment

How To Protect Your Data In A Multi-Cloud Environment

Operating in a multi-cloud environment is rapidly becoming the norm for most companies. In 2018, research from the IBM Institute
3 min read
Apr
06
How businesses are making way for zero trust

How businesses are making way for zero trust

The companies used to work on a castle-and-moat defense principle in the past. By default, everyone within the network is
5 min read