Overcoming Privacy Challenges with Data Clean Room Technology

Data clean rooms (DCRs) are emerging as indispensable tools for modern businesses, particularly in marketing. These secure, privacy-compliant platforms enable organisations to analyse and share data collaboratively without exposing sensitive…

Continue ReadingOvercoming Privacy Challenges with Data Clean Room Technology

THE DAY TELEGRAM’S SHIELD CRACKED: PAVEL DUROV’S ARREST SPARKS A GLOBAL DEBATE

Pavel Durov, Telegram's CEO, has been detained in France amid allegations that the messaging service failed to combat criminality on its platform, particularly the spread of child sexual abuse material.…

Continue ReadingTHE DAY TELEGRAM’S SHIELD CRACKED: PAVEL DUROV’S ARREST SPARKS A GLOBAL DEBATE

Bangladesh Innovation Conclave Spearheads Cyber Resilience Discussions at Landmark: Bangladesh Cyber Security Summit

Bangladesh Innovation Conclave hosted the Grameenphone Presents Bangladesh Cyber Security Summit Powered by Link3 Technologies and IDEA Foundation in association with bKash Limited and in collaboration with Smart Bangladesh Network…

Continue ReadingBangladesh Innovation Conclave Spearheads Cyber Resilience Discussions at Landmark: Bangladesh Cyber Security Summit

Two Sides of a Coin: The Love-Hate Relation of AI and Creativity

On December 1, 1913, something revolutionary happened. A simple modification made by Henry Ford reduced the time it took to build a car from more than 12 hours to one…

Continue ReadingTwo Sides of a Coin: The Love-Hate Relation of AI and Creativity

 ARE WE PAYING ATTENTION TO CYBERSECURITY?

The unique circumstances that 2020 presented allowed cyber criminals to exploit vulnerabilities in companies and perpetuate damage projected to hit  $6 trillion annually by 2021. This is a massive figure in damages which not only does financial damage to the organisations against which the attacks have been carried but also does tremendous damage to their reputation, their clients and partners.

Continue Reading ARE WE PAYING ATTENTION TO CYBERSECURITY?