Are your smart gadgets running on Android? If yes, that means it is running Linux underneath. Well then, get ready to get bugged – because an attacker never sleeps! Yes,… Read more »
The key to cyber security management is to protect your data. The first step to protect your data is to ‘know’ your data – where, rather where all, is the data, where is it originating, flowing, residing, getting touched, tampered, deleted and such.
The Smart Era is exploding with smart gadgets floating all around us. The willingness to adapt these gadgets is fast-booming. But lets speak facts: are these devices ‘really smart’? A look into their characteristics and some indeed-smart wearables!
Shadow IT, or the event where technology related activities or developments are conducted outside of and without the knowledge of the enterprise IT team, is one of the phenomenon that has gained prominence in recent years.
It was two weeks ago. I was chatting with the CFO of a major automobile manufacturing company. This is one of the largest companies in the world. I was waxing eloquent… Read more »