top of page

Profile

Join date: Feb 24, 2025

Posts (23)

Dec 12, 20255 min
Digital Inheritance and Posthumous Data Security: A Guide to Managing Your Cyber Legacy
SHIKSHA ROY | DATE: NOVEMBER 12, 2025 In today’s world, where daily life ties closely to online spaces, people carefully arrange who gets their home or old keepsakes. But most forget about something just as real - their digital presence. Whether it's private bank details, photos saved online, or profiles on social apps, this stuff doesn't vanish when we’re gone. Instead of ignoring it, more folks are starting to take steps ahead of time. This guide breaks down why handing off your digital...

8
0
2
Nov 25, 20255 min
5G Cybersecurity: Protecting Ultra-Fast Networks from Emerging Threats
SHIKSHA ROY | DATE: MARCH 19, 2025 The advent of 5G technology has revolutionized the way we connect, communicate, and consume data. With its ultra-fast speeds, low latency, and massive connectivity, 5G is set to transform industries, from healthcare to autonomous vehicles. However, as with any technological advancement, 5G also brings with it a host of cybersecurity challenges. The increased speed and connectivity of 5G networks create new vulnerabilities that cybercriminals can exploit....

3
0
2
Nov 24, 20254 min
Cybersecurity Risks in Decentralized Finance: Protecting DeFi Platforms from Exploits
SHIKSHA ROY | DATE: MARCH 05, 2025 Decentralized Finance (DeFi) has emerged as a revolutionary force in the financial sector, offering users the ability to access financial services without intermediaries. By leveraging blockchain technology, DeFi platforms enable peer-to-peer transactions, lending, borrowing, and trading. However, the rapid growth of DeFi has also exposed significant cybersecurity risks. Smart contract exploits, protocol vulnerabilities, and malicious attacks have resulted...

9
0
1
bottom of page