Security

China Is Vocally Standing Up for Its Data Protection and Privacy Rights

For Chinese people, the year 2018-19 could be considered as the time for ‘wake up’ to privacy. After Zao apps controversy, Chinese users recently challenged another internet giant, Alibaba. Alibaba’s financial arm, Ant Financial has launched Zhima (Sesame) Credit which

Read More

What Should Developers Know About Threat Modeling?

Threat modeling is a process that very few developers seem to pursue. However, it is a process that helps you and your entire team to model all potential threats to model all possible risks to your application. This process has

Read More

How to Ensure Data Security in Organizations?

The cybersecurity world is progressing at high speed. At the same time, innovation in technologies is becoming increasingly better to combat cyber-criminals and hackers to exploit data security loopholes. Both Artificial intelligence and machine learning are now offering high applications

Read More

The National Cybersecurity Strategy of the European Union

In today’s world where the internet and digital landscape is continuously increasing, it also leads to a considerable growth in cyber threats. In order to safeguard its critical infrastructure against new, emerging global cyber threats, EU Members States need flexible

Read More

The Comprehensive Guide to VPN Encryption Ciphers

VPNs were introduced almost 20 years ago and are a staple of today’s modern security. Used personally and by large organizations alike, VPNs are as common as handheld devices. A VPN assigns new IP addresses, transmitting online traffic through an

Read More

Boeing Partners with DCRC to Develop AI Unmanned Systems for Military

The Australian aerospace company Boeing has collaborated with the Trusted Autonomous Systems Defence Cooperative Research Centre (DCRC) to develop AI technologies for military operations using unmanned systems. The partnership, as its first project together, will examine an unmanned system’s route

Read More

Will The Fight For Privacy Online Affect Big Data?

The short answer: probably. Long answer, as always: it’s complicated. Before we take a look at the factors that could influence big data we need to answer a question that’s on most everyone’s mind these days.   What Exactly Is

Read More

Avoid Big Data Breaches with 6 Simple Steps

In 2005, the Privacy Rights Clearinghouse detailed 136 data breaches. However, between 2005-2015, a range of ten years, more than 4,500 data ruptures were made public. From that point forward, the issue has nearly turned into a pestilence and more

Read More

Using Data to Assess Risk

Following a data-driven approach is the best way of running a successful business. Data collection and analysis applies to many different areas- from understanding customer trends to reducing operational costs. But data also applies to risk management. By using analytics

Read More

How IBM is Adopting Automation in Cybersecurity

It might be a bold modern lifestyle in 2019 but at the same time, it’s a darn startling one for IT security professionals. Just take a look at some recent Gartner evaluations of the current security scenario. •  By 2020,

Read More