Follow
Deepak Gupta
Deepak Gupta
Tech Entrepreneur, Cybersecurity Author, and Researcher
Verified email at guptadeepak.com - Homepage
Title
Cited by
Cited by
Year
Computer and cyber security: principles, algorithm, applications, and perspectives
BB Gupta
CRC Press, 2018
1872018
Handbook of computer networks and cyber security
BB Gupta, GM Perez, DP Agrawal, D Gupta
Springer 10, 978-3, 2020
1102020
Decentralized identity using blockchain
D Gupta
https://venturebeat.com/datadecisionmakers/decentralized-identity-using …, 2022
22022
The Future of Password Managers and How AI Will Change The Game
D Gupta
https://guptadeepak.com/the-future-of-password-managers-and-how-ai-will …, 2022
2022
Cyber Attack - The Anatomy of an Average Hack and The Most Common Entry Points
D Gupta
https://guptadeepak.com/cyber-attack-the-anatomy-of-an-average-hack-and-the …, 2022
2022
Why Enterprises Should Shift Priorities Concerning Data Privacy
D Gupta
https://www.forbes.com/sites/forbestechcouncil/2022/08/01/why-enterprises …, 2022
2022
Why is Data Privacy an Immediate Enterprise Priority?
D Gupta
https://guptadeepak.com/why-is-data-privacy-an-immediate-enterprise-priority/, 2022
2022
Data Privacy: What Enterprises Need to Know?
D Gupta
https://www.amazon.com/Data-Privacy-What-Enterprises-Need-ebook/dp/B0B5XPD468/, 2022
2022
5 data privacy imperatives for enterprise leaders
D Gupta
https://venturebeat.com/datadecisionmakers/5-data-privacy-imperatives-for …, 2022
2022
Navigating a Corporate Data Breach
D Gupta
https://guptadeepak.com/navigating-a-corporate-data-breach/, 2022
2022
It's a Jungle in the Cloud: Why Serverless Is The Next Big Thing For Developers
D Gupta
https://guptadeepak.com/its-a-jungle-in-the-cloud-why-serverless-is-the-next …, 2022
2022
Cyber Security Working From Home
D Gupta
https://guptadeepak.com/cyber-security-working-from-home/, 2022
2022
How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access
D Gupta
https://guptadeepak.com/how-to-use-multi-factor-authentication-when-you-dont …, 2022
2022
Phishing Attacks: How to Identify & Avoid Phishing Scams
D Gupta
https://guptadeepak.com/phishing-attacks-how-to-identify-avoid-phishing-scams/, 2022
2022
How Open Source Is Fueling the Future of Data Sovereignty and Digital Autonomy?
D Gupta
https://guptadeepak.com/how-open-source-is-fueling-the-future-of-data …, 2022
2022
Corporate Account Takeover Attacks: Detecting and Preventing it
D Gupta
https://guptadeepak.com/corporate-account-takeover-attacks-detecting-and …, 2022
2022
What is lazy registration and how it is solving the problem of early registration
D Gupta
https://guptadeepak.com/what-is-lazy-registration-and-how-it-is-solving-the …, 2022
2022
Credential Stuffing: How To Detect And Prevent It
D Gupta
https://guptadeepak.com/credential-stuffing-how-to-detect-and-prevent-it …, 2022
2022
Use of blockchain technology could increase human trust in AI
D Gupta
https://guptadeepak.com/use-of-blockchain-technology-could-increase-human …, 2022
2022
Use of blockchain technology could increase human trust in AI
D Gupta
https://venturebeat.com/datadecisionmakers/use-of-blockchain-technology …, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20