Recently security researchers at Cisco Talos discovered that malicious hackers had injected a malware into Piriform CCleaner and CCleaner Cloud. CCleaner is a PC optimization tool. It removes potentially unwanted… Read more »
What is this Blue Whale Game? The Blue Whale Game is an internet game. It consist of series of tasks assigned to players / participants by administrators during a 50-day… Read more »
This is a continuation of our multi part blog – EU GDPR. The first part briefly explained the criticality and updates on this stringent privacy regulation. Link: https://blogs.dsci.in/eu-gdpr-part-i/ This part… Read more »
Globalization, evolving data lifecycle, criticality of data and technology advancements has brought forth new challenges and risks including those related to privacy protection. With Industrialization 4.0, Internet of Things (IoT),… Read more »
Think about an adversary who can understand asymmetric cyber risk management and is capable of leveraging cognitive capabilities to conduct hacks. Hence future digital organizations warrant a cognitive risk framework… Read more »
Trust is a market differentiator for the 21st century clients. To achieve trust, service providers need to protect client’s sensitive information which are either corporate secrets or personal information. Add… Read more »