Technology available to block search ads: Centre

An affidavit filed by the Cyber Law Division of the Union Communications and Information Technology Ministry before the Supreme Court on January 8 said the search engines did “have the relevant technology and deep-domain knowledge and expertise to block and/or filter words, phrases, expressions and sponsored links which are in violation of the PC-PNDT Act…

Vaultize Introduces Digital Rights Management in its Enterprise File Sharing and Mobile Collaboration

Vaultize takes an information-centric (or document-centric) approach to information security by ensuring that corporate information and data always stays in control of IT. It allows end-users to create, access, edit, annotate and share documents irrespective of where they are (within as well as beyond the corporate fence) and independent of the device they use (laptop,…

Securing the cyber frontiers

Any malicious attack in the cyber space can have crippling effect on vital systems in organisations. This has increased the demand for “cyber soldiers” — professionals who are equipped with knowledge to secure data banks, pre-empt hacking and develop effective defence mechanisms. Here’s a look at different courses that can arm this new-age cyber force…

CES 2015: The end of digital

Over the past few years, the most significant divide in the field of marketing has been the chasm between the digital folk and brand marketers. The digerati talk about engagement, obsess about tracking data across the funnel, and have an undying belief that technology can and will change the world. Whereas the brand-driven marketers look…