The Department of Communications and Digital Technologies (DCDT) takes the spotlight with the news it wishes to have the ...
Identifying and securing ownership of assets can be a challenging task. In addition to multifactor authentication, ...
An indigenous tech firm, Edgebase Technologies, has said its focus would be on investing in emerging technologies such as Artificial Intelligence (AI)-driven infrastructure and advanced cybersecurity ...
Police investigating a massive personal data breach at Coupang have secured records from the company’s key management system, ...
A decade and half ago, a global historic event took place in Bangkok, the picturesque capital city of Thailand. UNESCO ...
The year was marked by the acceleration of AI adoption by both defenders and attackers, greater third-party risks, and intensified governance pressure.
The next wave of cloud evolution will center on converged data security platforms—architectures that unify policy enforcement ...
Proactive Sensitive Data Leak Detection. Embed privacy across all stages in development, from IDE environments, with ...
Learn essential cloud security tips to protect cloud data safely. Discover key risks, prevention methods, and best practices ...
JISA Softech, in collaboration with the Data Security Council of India (DSCI) and the Ministry of Electronics and Information ...