Back to feeds

Anonymous

👁️ Big Brother is Watching... New software is being tested in the UK to monitor employees non-stop by webcam, checking their identity and emotions in real-time. Are you tired, stressed, or secretly annoyed? The AI will know and could force you to

See More

Inactive

Stealth • 2m

Data Security on Sword Employee Retention on Knife

0 replies

More like this

Recommendations from Medial

atharva singh

Stealth • 3m

My three friends and I have launched a startup focused on employee retention and human resources. Please provide insights into the B2B market and how we can excel in this area.

0 replies

Vishnu Jayan

Stealth • 9m

Productivity vs data security. Script almost there for an another MCU.

0 replies7 likes
Anonymous

EPFO (employees have control over their data) If the login credentials are compromised, employee data can be accessed by anyone. It is essential for the employees to have control to their data. Only the employees should be allowed to enter their dat

See More
0 replies2 likes
1
Image Description
Image Description

Vagle

Stealth • 1m

Security Managers: The people who keep your data safe... and their bank accounts full

6 replies7 likes
2
Image Description
Image Description

Murtaza ali Bohara

Stealth • 7m

There is a study on the population of the growth is directly proportional to the jobs of the country. "Where when country population increases the job increase as well" , but what India is facing is untrust on its employees the Old fashion thinking i

See More
9 replies4 likes
Image Description

Vasvi Seth

Stealth • 7m

Protecting personal data is crucial in today's digital landscape. Personally Identifiable Information (PII) encompasses any data that can be used to discern an individual's identity. Safeguarding PII is not just a responsibility; it's a commitment to

See More
4 replies5 likes

Shuvodip Ray

 • 

YouTube • 6m

AI relies on robust data management across 7 key components to build effective AI models: 1. sources, 2. ingestion, 3. storage, 4. transformation, 5. analytics, 6. governance and security, and 7. orchestration.

0 replies7 likes
1

Shubham

Stealth • 19d

Why Are Some Startups Ignoring Security? As a web penetration tester, I’ve reported many bugs to startup websites, including serious ones that put user data at risk. Yet, some of these issues are never fixed. Startups often focus on growth and new

See More
0 replies3 likes

Deepika Gandla

Stealth • 19d

Had an amazing experience at the 2-day workshop and 1-day hackathon on Ethical Hacking in Data Security, hosted by Sreyas Institute in collaboration with @SuprajaTechnologies! Gained hands-on experience with tools like BurpSuite, DeepSound, Steganogr

See More
0 replies4 likes

Vasvi Seth

Stealth • 7m

Security Posture: Essential for Safeguarding Critical Assets and Data 🛡️ In today's ever-evolving digital landscape, safeguarding critical assets and data is paramount. Your organization's security posture determines its ability to defend against t

See More
0 replies3 likes

Download the medial app to read full posts, comements and news.