Blog

Stay up to date with Payatu blog

Blog

Stay up to date with Payatu blog

Close the overlay

I am looking for
Please click one!

30/08/2020
dattatray

IoT Security - Part 12 (MQTT Broker Security - 101)

MQTT Broker Security - 101 This blog is part of IoT Security series where we discuss the basic concepts pertaining to the IoT/IIoT eco-system and its security. If you have not gone through the pre...

12/07/2020
nikhilj

SEC4ML Part-2: Adversarial Machine Learning attacks

This is the SEC4ML subsection of the Machine Learning series. Here we will discuss potential vulnerabilities in Machine Learning applications. SEC4ML will cover attacks like Adversarial Learning, Mode...

11/06/2020
dattatray

IoT Security – Part 6 (ZigBee Security - 101)

ZigBee Security 101 This blog is part of the “IoT Security” Series. If you haven’t read the previous blogs (parts 1 - 5) in the series, I urge you to go through them first unless you are alr...

10/06/2020
nikhilj

Security and privacy of AI/ML applications - A layman's guide

Machine Learning(ML) is under exponential growth these days. Businesses, Academia and tech enthusiasts are really hyped about trying out ML to solve their problems. Students are driven to learn this n...

29/04/2020
pratik

An analysis of Zoom’s take on Security & Privacy issues: Lockdown Edition

An analysis of Zoom’s take on Security & Privacy issues: Lockdown Edition Because of lockdown due to COVID-19 in most parts of the world, organizations are moving towards work from home culture....

29/04/2020
murtuja

The Emerging $5 Trillion Economy to Receive a Cybersecurity Policy Upgrade in 2020

The Emerging $5 Trillion Economy to Receive a Cybersecurity Policy Upgrade in 2020 The National Security Council Secretariat sought suggestions and comments to form the National Cyber Security Str...

08/04/2020
murtuja

Navigating the High Cost of a Data Breach

Navigating the High Cost of a Data Breach In the first article in this two-part series, we covered the factors that add to the cost of a data breach, the parameters that play a role in increasing ...

07/04/2020
murtuja

Calculating the cost of a data breach

Calculating the cost of a data breach Data breaches eat away at customer trust, brand image, and the overall reputation of a company. By November 2019, 7.9 billion records had been exposed tied to...