What is asymmetric encryption and public key infrastructure?
Let’s start with a small trivia. Do you know when was the first computer invented? It was back in the 19th century
Read MoreLet’s start with a small trivia. Do you know when was the first computer invented? It was back in the 19th century
Read MoreCentral Bank Digital Currencies (CBDC) are being floated as the next form of monetary instrument. Many central banks across the world are actively toying
Read MoreWe all know how volatile cryptocurrencies could be. In March 2021, Bitcoin reached a peak of $58,734. Come may, the
Read MoreThe Indian Computer Emergency Response Team (CERT-In) is an agency formed in 2004, under Section 70B of the Information Technology Act, 2000. It functions under
Read MoreEncryption techniques are increasingly used in non-military and government environments. Businesses have also begun relying on technology to protect applications and
Read MoreModern society is built on the foundation of technological advancements. Today technology infrastructure like the internet, cloud, computers containing sensitive
Read MoreOpen Source Intelligence (OSINT) is a technique used to gather open-source data from various freely available resources for a specific
Read MoreAccording to a report published by Deloitte, FinTech was one of the top five markets by value of capital funding
Read MoreIn our last technology explainer, we discussed encryption and the Indian legal system around it. Next, we have got hashing.
Read MoreThe United States Postal Service (USPS), early in February this year, filed a patent application for a technology that would allow US citizens to vote
Read More