The concept of robotics has been in existence for a long time, with Egyptians using automated water clocks to strike the hour bell and hydraulically operated statues that could gesture and speak in 400 BC. Subsequently, there have been many such instances of robotics in the history of mankind. The first modern-day Industrial Revolution dates … More Robotics and automation: threats and opportunities
The threat of cybercrime on the global banking and financial services industry is apparent with a tectonic increase in cases over the past few years. These attacks have become highly targeted, and cyber criminals seem to have hit the jackpot by deploying sophisticated techniques for illicit financial gains. From hacking the bank accounts of companies, … More Countering emerging cyber threats in the banking sector
Mobile devices and internet have emerged from being a ‘want’ to a ‘necessity’. In recent months, telecom price wars in India have brought down the cost of high-speed mobile data. At the same time, demonetization has made many consumers become more dependent on their mobile phones to make payments. These two instances alone led to … More Why be concerned with data privacy?
Safeguarding your technology assets has become critical than ever before. Further to the global outbreak on Friday, many global corporations have reported ransomware infections involving WannaCry 2.0 and many others that use the same exploit as WannaCry 2.0
Over the last few years, there has been an exponential rise in targeted cyber-attacks which are aimed at financial gain. Incidents around ransomware, data breach incidents and Distributed Denial of Service or DDoS attacks also made headlines worldwide. Today, a company’s ability to deal with such situations effectively is a priority but at the same … More Cyber incident response remains low in corporate India
In recent times, there have been increasing concerns around data breaches and other security threats among companies and individuals alike. The use of new techniques and complex technologies has been both a bane and a boon here. Some stakeholders believe that the risk of data breach increases with growing technology adoption, while others believe that … More Protect confidential data from being sold as ‘scrap’
Imagine a scenario when your alarm clock is connected to the internet, and accesses your calendar to know when and where the first appointment of the day is. It simultaneously cross-references that against the latest traffic conditions, depending on which you can sleep a little longer or wake up earlier. The curtains in your bedroom open, … More Understanding the Internet of (Hacked) Things