Read Time: 4 minutesSecurely connecting every user to any cloud or hybrid application and data store ColorTokens, a Zero Trust...
Read Time: 4 minutesCan you land in jail for sharing Obscene Message online in private? You need to know what constitutes an offence under IT Act....
Read Time: 3 minutesIs the need for cybersecurity increasing? The world of technology has been constantly evolving. With more and more people moving online, the risk...
Read Time: < 1 minuteAlert Group Admins and group members. How to function in a group? Very Important: Confirm the validity of the news you wish...
Read Time: 3 minutesIt’s the 30th anniversary of the Computer Security Day that the world started observing in 1988. Many of us who had joined the...
Read Time: 2 minutesOn Monday, November 20, Intel released an advisory for security listing latest vulnerabilities in Management Engine of its Intel remote administration feature. It...
Read Time: 2 minutesGovernment has provided more than 500 customised Google Pixel phones with Reliance Jio SIM cards to senior bureaucrats for “secure communication.” These phones...
Read Time: 6 minutesCyber Attack is an offensive activity employed by nation-states, individuals or organizations that target computer information systems, computer networks, infrastructure etc. This attack...