top of page


An exclusive webinar on the Digital Personal Data Protection (DPDP) Act, 2023
An exclusive webinar on the Digital Personal Data Protection (DPDP) Act, 2023, and its draft rules, was conducted on 17th April 2025....
sujosutech
6 days ago1 min read
28
0


Customer Identity and Access Management (CIAM) Solutions – Implementation of SAP Customer Data Cloud (CDC)
Introduction Customer Identity and Access Management (CIAM) is a specialized branch of identity management focused on external users such...
sujosutech
Apr 115 min read
9
0


Privacy Principles and DPDP Act
Privacy principles are fundamental guidelines that organizations and individuals should follow when handling personal information. Some...
sujosutech
Apr 75 min read
11
0


Cyber Security and Data Privacy in Australia
Australia has a culture of implementing stringent cyber security measures for safeguarding organizational and national assets. The...
sujosutech
Mar 274 min read
17
0


Data Privacy Compliance - Global Standards and Legislations
The availability and large-scale use of sensitive data like personal identifiers, healthcare records, financial data etc., has given rise...
sujosutech
Mar 195 min read
24
0


AI and Data Privacy - Addressing Privacy Challenges in AI Systems with Sujosu Technology
The proliferation of Artificial Intelligence (AI) systems has revolutionized industries, but it has also brought significant challenges,...
sujosutech
Jan 242 min read
32
0


Nasscom-DSCI Annual Information Security Summit 2024 - Highlights
The Nasscom-DSCI Annual Information Security Summit was held in New Delhi during 4-6 December, 2024. Senior consultants and developers...
sujosutech
Dec 12, 20243 min read
17
0


Top Security Threat – Cloud Threats
Most businesses are moving to cloud to cut costs, facilitate business expansion, and benefit from better business continuity and disaster...
sujosutech
Dec 6, 20242 min read
6
0


Top Security Threat – IoT Threats
The Internet of Things (IoT) includes several devices that are connected online. These include household appliances (television,...
sujosutech
Dec 4, 20242 min read
6
0


Top Security Threat – Fileless Malware
Fileless malware is a type of malicious software that works directly within a computer’s memory instead of the hard disk. It is termed...
sujosutech
Dec 3, 20242 min read
0
0


Top Security Threat – Cryptojacking
Cryptojacking is a cyber threat in which attackers use a victim’s computer stealthily to mine for cryptocurrency. Cryptojacking can...
sujosutech
Nov 29, 20242 min read
1
0


Top Security Threat – Supply Chain Attack
Supply chain comprises of the network of all the individuals, organizations, resources, activities, and technology involved in the...
sujosutech
Nov 27, 20242 min read
3
0


Top Security Threat – Advanced Persistent Threat
An Advanced Persistent Threat (APT) is a sophisticated and prolonged cyber-attack in which an intruder targets a specific organization,...
sujosutech
Nov 25, 20242 min read
2
0


Top Security Threat – Insider Attack
Insider attacks are those cybersecurity attacks which arise from within the targeted organization. These are perpetrated by authorized...
sujosutech
Nov 22, 20242 min read
2
0


Top Security Threat – Denial of Service Attacks
Denial of Service (DoS) attacks attempt to overload websites or networks with a flood of illegitimate traffic, with the intention of...
sujosutech
Nov 20, 20242 min read
1
0


Top Security Threat – Man-in-the-Middle Attacks
A Man-in-the-Middle (MitM) attack is a type of cyber-attack in which an attacker intercepts and/or alters communications between two...
sujosutech
Nov 18, 20242 min read
2
0


Top Security Threat – Injection Attack
Injection attacks refer to a class of attack vectors where attackers can exploit application vulnerabilities to send malicious code into...
sujosutech
Nov 15, 20242 min read
1
0


Top Security Threat - Phishing
Phishing is a type of social engineering attack that uses fraudulent emails, text messages, phone calls or websites to trick people....
sujosutech
Nov 13, 20242 min read
2
0


Top Security Threat - Ransomware
Ransomware is a type of malware that uses sophisticated techniques to deny a user or organization access to critical data. They may lock...
sujosutech
Nov 11, 20242 min read
1
0
bottom of page