Data security is increasingly becoming a big problem for businesses of all kinds. Of course, as the world becomes increasingly digital, the danger present within that digitization only becomes apparent in real-time. …


Lots of people can relate to their phone running out of battery when outdoors. Thus, the development of public charging stations was a perfect solution for this.

However, the threat of ‘juice jacking’ has recently been raised, prompting some to worry whether it is wise to use public charging points.


What if you could go to a coffee shop, have your phone charged, and pay without taking your phone out of your pocket? What if you could quickly pay without handing out cash while waiting in line at the cinema or the bus station? Or drive up to the gas…


Ransomware is a form of malicious software that uses encryption to prevent users from accessing their data. Usually, a ransom payment is demanded from the victim before giving access to the encrypted data. …


Photo by Alex Knight on Unsplash

The concept of ‘absolute security’ in the context of cyberspace might be unattainable, considering the relative nature of security. Amidst the global turbulence in 2020, malicious actors have found low-hanging fruits in AI, IoT, cloud systems, and 5G, targeting enterprises worldwide. However, international organizations have been agile and adapting innovative…


Photo by Hitesh Choudhary / Unsplash

The technology behind the world’s first cryptocurrency, Bitcoin, has taken the world by storm. Bitcoin is geared up by blockchain — a distributed ledger constructed with impenetrable cryptography that is open source, transparent, and highly anonymous. According to Gartner, blockchain was one of the most disruptive technologies in 2020. …


Workplace communication is getting revolutionized by the widespread adoption of the internet and digital technologies. However, while technology has improved productivity and innovation for the enterprise, the human element in People, Process & Technology has been the weakest link in enterprise information security. …


With more companies moving their business models online and adopting new solutions, it’s been opening up more opportunities for cybercrime and identity theft. The spread of Covid-19 has only made it worse, as the Federal Trade Commission (FTC) estimated a loss of $13.4 …


With technology evolving in leaps and bounds, AI is shaping the future of digital transformation for every business seeking speed, scalability, quality and flexibility.

Since DevOps is on the verge of delivering exceptional software development environments, DevOps in AI is undeniably the next breakthrough in technology. We’ve witnessed every industry…


When it comes to Digital Identity concepts, Authentication is one of the most important. The previous articles of the Guide to Digital Identity series have included the knowledge bundle for it. In continuation, this article is dedicated to Single Sign-On (SSO), which is also an authentication concept.

What is Single Sign-on (SSO) and how it works

Single Sign-On (SSO)…

Deepak Gupta

CyberSecurity innovator and author. Developer at heart. Co-founder/CTO of @LoginRadius, 🇮🇳 learn more — https://guptadeepak.com

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store