IETF Series: How IETF works? (Part II)
I illustrated India’s contribution in IETF in my earlier ‘India in IETF’ post and asked you to provide comments and suggestions on how we can improve the quality and quantity… Read more »
I illustrated India’s contribution in IETF in my earlier ‘India in IETF’ post and asked you to provide comments and suggestions on how we can improve the quality and quantity… Read more »
About The OWASP Mobile Security Project The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain… Read more »
Let’s face it – “Your online presence is not secure!” Yes, before you wonder in awe about all those identities you have created on various online platforms here are some… Read more »
This blog is more focused on the security threats exposed and experienced by beginners, infrequent internet users or those who spend much time on social network without appropriate security concerns. As part of a series, this is the first blog post.
With the advent of IoT (Internet of Things) and IoE (Internet of Everything) concerns about Data Privacy are predicted to increase exponentially. It is therefore not a big surprise that… Read more »
With the focus on making security an inherent component of Digital Transformation, the 7th Best Practices Meet, commonly referred to as ‘BPM’, was held in Bengaluru between 9-10 July, 2015. It successfully looked into the structural and systematic analysis of security, and drove deliberations towards the need to build security by design.