Best Practices For User Access Provisioning

When an employee is hired, he or she is given access to certain resources of the organisation through a personalised account created by the IT department. As part of identity access management (IAM), the account needs to be updated or…

Difference Between Cybersecurity & Information Security

Both the terms, cybersecurity and information security, are associated with the security of computer systems and are often used as synonyms. For those who are not aware of the difference — the definition and understanding of the terms vary a…

CCPA – What It Means For The Tech Giants And Its Users

CCPA or California Consumer Privacy Act or AB 375 was passed by the State of California in the month of June in 2018. The bill will be enforced from the 1st of January 2020. CCPA’s design closely resembles that of…

Top 7 Most Trusted Cybersecurity Firms In India

The cybersecurity space in India is still in its nascent stage at $4.4 billion a year. Now with the Indian government taking multiple initiatives to encourage the digital transformation of the country through the growth of tech firms, the cybersecurity…

More than 1,00,000 people are subscribed to our newsletter

Subscribe now to receive in-depth stories on AI & Machine Learning.