Recently security researchers at Cisco Talos discovered that malicious hackers had injected a malware into Piriform CCleaner and CCleaner Cloud. CCleaner is a PC optimization tool. It removes potentially unwanted… Read more »
What is this Blue Whale Game? The Blue Whale Game is an internet game. It consist of series of tasks assigned to players / participants by administrators during a 50-day… Read more »
This is a continuation of our multi part blog – EU GDPR. The first part briefly explained the criticality and updates on this stringent privacy regulation. Link: https://blogs.dsci.in/eu-gdpr-part-i/ This part… Read more »
Globalization, evolving data lifecycle, criticality of data and technology advancements has brought forth new challenges and risks including those related to privacy protection. With Industrialization 4.0, Internet of Things (IoT),… Read more »
Think about an adversary who can understand asymmetric cyber risk management and is capable of leveraging cognitive capabilities to conduct hacks. Hence future digital organizations warrant a cognitive risk framework… Read more »
Layers & extent of product security function and integrating security in rapid deployment cycle Ever since the field of software development has existed, the security of the product being developed… Read more »