Estimated reading time: 3 minutes
In 2015, the Government of India established a first of sorts – they created a chief cybersecurity officer position under the Prime Minister’s Office. Dr Gulshan Rai became the special secretary for cybersecurity and after serving four years in...
Estimated reading time: 3 minutes
A supply chain is an omnipresent and inseparable element in every business, irrespective of its size. Hence, when it comes to cybersecurity specific to this aspect, simply protecting an enterprise’s periphery isn’t enough. Supply chains consist of people, logistics,...
Estimated reading time: 3 minutes
The evolution of cybersecurity is both, fascinating and intriguing. Today’s cybersecurity professionals have immense responsibility and burden compared to yesteryears – they have to tackle with a wide range of cyberthreats such as malware, insider attacks & Distributed Denial...
Estimated reading time: 3 minutes
A major part of human communications today is dependent on satellites. More so, global navigation systems, military strategies, information collection, environment research, and even the internet are all dependent on the smooth functioning and continuous integration with these valuable...
Estimated reading time: 3 minutes
In 2015, security researchers Charlie Miller and Chris Valasek remotely took control of a Jeep Cherokee vehicle as an experiment. By exploiting vulnerabilities in the vehicle’s Internet-connected entertainment and navigation systems, the two researchers activated the windshield wipers, turned...
Estimated reading time: 3 minutes
Seqrite is the enterprise security brand from Quick Heal, a leading IT security solutions company with over 25 years of experience in computer and network security solutions. Backed by Quick Heal’s cutting-edge expertise of producing cybersecurity solutions for more...