cybersecurity

anna eshoo, censorship, civil rights, cybersecurity, internet, internet shutdown, Legislation, morgan griffith, Politics, preventing unwarranted communications shutdowns act, technology

New Bill Aims to Rein In the President’s Power to Order Internet Blackouts

Two members of Congress have introduced legislation that would prevent the president from taking action to restrict the U.S. public’s access to the internet, the Preventing Unwarranted Communications Shutdowns Act (PUCSA).Read more…

100X.VC, acquisitions, airtable, Aurojyoti Bose, Axisroom, Business, CAD, campus, Codleo Consulting, COGOS, computer aided design, content management, Coronavirus, COVID-19, customer relationship management, cybersecurity, Delhivery, Edited by Itika Sharma Punit, Everest Group, Facebook, Facilion, Flock, Freshworks, Gaurang Sinha, geographic information systems, GIS, globaldata, Google, happiest minds, Hotelogix, HRM, Human resource management, investment, Investors, Invoicing, IT company, Jio Platforms, JioMeet, Karmesh Gupta, kirana stores, logistics platform, management information systems, Mergers, microsoft teams, mobikwik, N Shivakumar, Nykaa, pandemic, Postman, Prasad Sreeram, Prem Kumar, Repup, ResourceTree, SaaS, Shashank Randev, slack, Snapbizz, Software as a Service, Stocks, talent acquisition, Tech, technology, unicorn, web-based service, WiJungle., Yugal Joshi, Zomato, zoom

For some Indian software startups, it’s almost like the Covid-19 lockdown never happened

A host of Indian software startups have had a field day amid the pandemic as their clients’ dependence on technology increased.

authentication, cybersecurity, identity, infographic, Infographics, passwords, Security, technology

A Guide to Authentication Methods (Infographic)

Stolen passwords and weak passwords are responsible for over 80% of security breaches in 2018, and in 2019 over 150,000 security incidents and nearly 4,000 confirmed data breaches were caused due to weak or stolen passwords. Passwords are some of the weakest forms of authentication, and when user authentication is not secure, cybercriminals have easy access to take whatever information they want.    Creating the perfect authentication method does not include just security, but also user convenience. Passwords and security questions are a very weak form of authentication as it leans on ‘shared secret’ between a service provider and a

1 2 3 18