AltLayer, a decentralized interlayer for rollups, has announced a strategic partnership with Automata Network to build Automata 2.0, the first modular attestation layer 2 for the&n… Read More
Google continues the rollout of its Privacy Sandbox APIs — its replacement for tracking cookies for the online advertising industry. Today, right on schedule and in time for the launch… Read More
Tech giant Google has just put out a new proposal API called the Web Environment Integrity. This is being portrayed as the DRM for the web, as confirmed by the leading Android maker recently… Read More
Differences Between TPM vs HSM
Trusted Platform Module vs Hardware Security Module (TPM vs HSM)
Before delving into the difference between TPM and HSM, it is essential to understand th… Read More
Microsoft (US), IBM (US), Intel (US), Google (US), AMD (US), Fortanix (US), AWS (US), Arm (UK), Alibaba Cloud (China), Swisscom (Switzerland), OVHcloud (France), pheonixNAP (US), AMI (Geo… Read More
Introduction
While adopting the cloud, a large investment bank was looking to move its critical data consisting of personal and business details of high-net-worth customers like financial de… Read More
Amazon Web Services (AWS) is pleased to announce the third issuance of the Swiss Financial Market Supervisory Authority (FINMA) International Standard on Assurance Engagements (ISAE) 3000 Ty… Read More
With new breakthroughs from Microsoft and other key manufacturers, the IT industry is developing at a dizzying pace. New technologies like cloud, mobile, social media, big data, and other em… Read More
Security testing is a process that helps in unveiling all the possible vulnerabilities and loopholes in a system which might result in cyber-attack or data breach.Here are some of the factor… Read More
AWS re:Invent 2022 is fast approaching, and this post can help you plan your agenda with a look at the sessions in the security track. AWS re:Invent, your opportunity to catch up on the la… Read More
API keys are used to authenticate requests to an API. They are generally used to authenticate users or devices, or to access data that is not publicly available. Android apps typically use… Read More
Given the millions of devices running Android and the numerous variants of Android Open Source Projects (AOSP) running on these devices, the Android platform is inherently vulnerab… Read More
Chainlink and Proofi are revolutionizing identity through a strategic partnership. With Chainlink support, Proofi will distribute identity attestations through a decentralized network, and i… Read More
Launched in the year 2016 by MeitY, Digilocker India’s cloud based platform has now reached 100 million users. As of now the could based storage platform digilocker has 101.1 mil… Read More
How the C-Suite can set the organisation up for metaverse successIn order to reap the benefits that the metaverse offers, the most important thing leaders need to do currently is to build… Read More
Customers around the globe—from governments and highly regulated industries to small businesses and start-ups—trust Amazon Web Services (AWS) with their most sensitive data and a… Read More
As many companies integrate return to the office plans with existing work-from-home strategies, a key component is building a device management and security strategy centered on remote acces… Read More
The iOS vs Android battle is never-ending. Personal predilections aside, there is no reason why Android should be given a secondary treatment to iOS, especially when it comes to enterprise… Read More
The surge in remote and mobile working has put an increased emphasis on how organizations should best manage and secure device access to critical information. New research from Omdia, in a s… Read More
Today, web applications have claimed a significant chunk of market share from their aging counterparts such as client-server and locally installable applications. It has be… Read More
SafetyNet is a set of APIs provided by Google to safeguard Android apps against device tampering and harmful apps. Currently, the SafetyNet API provides Attestation, Safe Browsing, reCAPTC… Read More
In our previous posts, we were discussing about Recylerview in Android DoodleBlue Android Interview Questions with Answers – PART II. In this post, let us discuss brielfy about G… Read More
Sibos Day 2 was a hectic day, starting off with a breakfast with Sir Tim Berners Lee (the inventor of the World Wide Web), which was supposed to be followed by a session on APIs in Financial… Read More
An informal, unofficial Paper by Rajesh Aggarwal, IAS
Currently serving as the Joint Secretary-Financial Services, Ministry of Finance, Government of India, Rajesh Aggarwal recounts his expe… Read More