Hiding Behind Incognito Browsing
Malaika Naidu A major hype word and internet trend today is data privacy. Add to this the vulnerability brought in by excess use of social media and the integration of…
Malaika Naidu A major hype word and internet trend today is data privacy. Add to this the vulnerability brought in by excess use of social media and the integration of…
Malaika Naidu The most valuable resource today is not oil, water or fresh air – it’s data! An article in The Economist recently outlined just how valuable this resource is…
The relationship between law and technology forms a strong basis for discussion and debate. Both are intertwined, and any discussion would be incomplete without acknowledging the other. Any conversation…
Antony Clement Rubin and Janani Krishnamurthy were until recently unknown names in the field of law. Then they went to town questioning our very understanding of privacy. They filed…
We all know that cybercrime is a reality and it only growing with every passing day. With the deep penetration of smartphones into major markets across the world, we’re…
In 2017, 2 billion data records were compromised, followed by more than 4.5 billion records in just the first half of 2018. With every passing year, and at an…
1. End-point security Endpoint security requires that each computing device on the network comply with certain standards before network access is granted. Endpoints include laptops, desktops computers, smartphones, and other…