Home Tags Cybersecurity

Tag: Cybersecurity

Sequretek launches security solution

Cyber security company Sequretek, has launched Endpoint Detection Prevention Response (EDPR), an Artificial Intelligence-based solution that helps simplify endpoint security across various software operating systems. Extensive digital footprint makes the...

How Do You Secure a Connected Home?

The advent of technology has indeed been a revolution that changes the world completely with new devices being introduced on the market every day. With smartphones and advanced personal...

Airtel Acquire AuthMe, An AI Led Mobile Security Startup

On Wednesday, Bharti Airtel said that it has inked an acquihire deal with AuthMe ID Services (“AuthMe”), a Bengaluru based start-up focused on Artificial Intelligence-based solutions, to increase its...

Internet of Things Is Causing More Problems Than Solutions

A relatively new concept, the Internet of Things (IoT) refers to any and every Wi-Fi-enabled device on the market today. From smartphones to smart refrigerators, IoT is a simple...

Cybersecurity Startup Sequretek Raises $3.7 Mn

Cybersecurity company Sequretek Tuesday said in a report today morning that it has raised Rs 27 crore which is led by a prominent investor that is Unicorn India Ventures....

Challenges for data scientists

Data science is broadening, and so its branches all across the world. But there includes plenty of challenges that hinders the data scientist when dealing with data. So, let...

LifeLock is exposing email unsubscribe customer data

Life Lock is a company which is able to identify theft protection, the company is division of Symantec Corp., and they are the one who exposed all the email...

IOT CyberSecurity Spending’s to surge

Several high-profile studies over the recent years have divulged the lack of measures taken observed among enterprises when it comes to insecure IoT devices and the usage of insecure...

Types of Malware and How to Defend Against Them

At the bottom line, malware is a bit of awful news wrapped up in programming. Malicious + Program= Malware Malware is specifically designed and coded with an underlying purpose of causing...

How to Prevent a Cyber Attack on a Windows 10 PC

Microsoft prides itself on Windows 10 security, but because of the sheer size of the Windows install base, Windows-based systems are a natural target for hackers and bad actors....
Machine Learning is an aid to Information Management

Machine Learning is an aid to Information Management

Managing information is a troublesome work we all agree and most of us struggle to do it efficiently. Organizations vary in attitude when it comes to their employees understanding...

Factors to Determine the Success of IoT Project

IoT has emerged as the leader in today’s technology driven market. It has led to the emergence of smart and revolutionized interactions between people and technology. Today, everything can...

Google Chrome 67 Gets Site Isolation Feature

One of the largest used browser, Chrome has been given security feature which is called Site as Isolation on mostly all the operating system which includes Windows, macOS, Linux,...

AI-powered cybersecurity venture ThetaRay $30 Million

ThetaRay is a well- known data analytics company based in Hod HaSharon, Israel has announced yesterday that they raised almost $30 million in funding round which was held by...
Cloud computing advantages: cloud benefits in motion – cloud myths, truths and evolution

Cloud computing advantages: cloud benefits in motion – cloud myths, truths and evolution

For almost two decades cloud computing is used. It is predicated that by 2020, the companies and business will invest more in cloud technology. Cloud is helping us in...

Send this to a friend