As the world getting more connected with advent of digital technologies
Maturity and inherent connectedness of people and devices and whole
lot of communication that goes on within an outside the organizations.
Now cybercriminals are also far ahead in their tactics and...
Today, a marked shift is evident from a conventional cybersecurity approach based on “trust but verify” to a “zero trust” model. In continuation of our series “Unraveling Security”, IBM and SMEVenture organized the second webinar on “Zero Trust to...
The Indian government’s public procurement portal, Government e-Marketplace (GeM), has recently signed a landmark agreement with the Sikkim government....