Hunting Security Threats
Threat Hunting is the next stage of evolution for organizations seeking to advance their cyber defence strategy. It is an indicator that an organization considers its security practices, mature enough,… Read more »
Threat Hunting is the next stage of evolution for organizations seeking to advance their cyber defence strategy. It is an indicator that an organization considers its security practices, mature enough,… Read more »
Many organizations have recognized that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into everyday… Read more »
Recently security researchers at Cisco Talos discovered that malicious hackers had injected a malware into Piriform CCleaner and CCleaner Cloud. CCleaner is a PC optimization tool. It removes potentially unwanted… Read more »
This is a continuation of our multi part blog – EU GDPR. The first part briefly explained the criticality and updates on this stringent privacy regulation. Link: https://blogs.dsci.in/eu-gdpr-part-i/ This part… Read more »
Globalization, evolving data lifecycle, criticality of data and technology advancements has brought forth new challenges and risks including those related to privacy protection. With Industrialization 4.0, Internet of Things (IoT),… Read more »
Cognitive Computing has just started permeating into our lives and is taking small steps to transform business models in the industry. Its use cases are not limited to speech, image… Read more »