Profile cover photo
Profile photo
Ajay C Bhayani
1 follower
1 follower
About
Ajay C's posts

Post has attachment
ATMs Easy Target for Hackers
At a time when serpentine `queues continue to grow outside ATMs across the country following the demonetization move, a top executive of Intel Security has warned that ATMs in India are susceptible to security breaches. In banks, a breach can happen at mult...

Post has attachment
Get your website to https:// else chrome with brand your site as Not Secure
Your website is your online reception and you have invested heavily to attract more visitors and create more visibility. But now owners and developers of these websites, eCommerce portal  will have to rethink their online strategy. In a push to make the Int...

Post has attachment
Dynamic Key Management for dynamic access to data in IOT age
                                           Over past few year security discussions have moved on from Silo based which is serving only specific departments/pain-points to holistic which not only addresses the security requirement but also enable business  t...

Post has attachment
Why we are still using old ways of 2fa?
Now companies recognize the value of two-factor authentication and have started using Two-factor authentication in the form of Hard tokens and SMS to protect against remote attacks such as phishing, credential exploitation and other attempts to takeover our...

Post has attachment
Is Security a concern for "e-sign using Aadhaar"
‘ G ovt. of India’ has taken a huge stride in their Digital India Initiative by introducing ‘e-sign using Aadhaar Card’. First, the Introduction of ‘Aadhaar’, then the introduction of ‘Digital Locker’ and now the ‘e-sign’, the government is surely striving ...

Post has attachment
Digital Signatures Market to quadruple till 2020
As companies started using Digital signatures, they have realized how much time and money they previously wasted in physical signings. Another thing that has been seen is that the ROI on Digital signatures is observed in a very short period of time after im...

Post has attachment
Mobile Threats to your Business including malware and OS vulnerabilities
Companies have always been a target for hackers, but recently, organisations have been dealing with the security implications of the arrival of mobile devices in the workforce. This has added a range of new threat possibilities which companies cannot necess...

Post has attachment
SSL in NutShell for Nuts
SSL stands for Secure Socket Layer, but that still probably doesn’t mean a lot, so what is it and what does it do? It’s a mechanism for securing a communication channel. It’s a method of verifying the identity of the key owner. Securing the Channel Why do w...

Post has attachment
Growth of Multi-Factor Authentication
The global multi-factor authentication (MFA) market was valued at USD 3.60 Billion in 2014 and is expected to reach USD 9.60 Billion by 2020, at an estimated CAGR of 17.7% from 2015 to 2020. The two-factor authentication is most widely used MFA model follow...

Post has attachment
The importance of identity verification for online users
As services and socialising shifted online, identifying each other digitally has become increasingly important. Following are some key solutions and implications for businesses and users. Using our ‘real’ identities online A user’s digital behaviour never u...
Wait while more posts are being loaded