Today, a marked shift is evident from a conventional cybersecurity approach based on “trust but verify” to a “zero trust” model. In continuation of our series “Unraveling Security”, IBM and SMEVenture organized the second webinar on “Zero Trust to...
The two sides of Digitization: Convenience and Data Theft
If I say that the world is data-driven, I don’t think I am wrong. In the 1980s, the world witnessed a digital revolution that completely changed the world and continues to...
The Indian government’s public procurement portal, Government e-Marketplace (GeM), has recently signed a landmark agreement with the Sikkim government....