WhatsApp: Cleartext Sensitive Information
Do you use WhatsApp? Of course, you do. Do you think everything such as your contacts or chat messages are encrypted? No. It is not encrypted. Recently the famous… Read more »
Do you use WhatsApp? Of course, you do. Do you think everything such as your contacts or chat messages are encrypted? No. It is not encrypted. Recently the famous… Read more »
The term “Information Security”, once deliberately used by sagacious people of Information Security community to emphasis on the enterprise-wide scope (“it is not only about IT”) of the term, is getting faded away and the new term “Cyber Security” is replacing its predecessor.
Before I start on Part 3, till now we have seen: Sr Phase Steps 1 Pre POC Identify business requirement and its weightage Multiple products & feature analysis Organization’s budget… Read more »
Nandkumar Saravde appointed new CEO of DSCI; Connects with stakeholders and Corporate Members
The trend of Smartphone has evolved very drastically over the decade. The Smart devices almost double up each year. Through usage of mobile devices the productivity and the way organizations… Read more »
In Pre-POC, We have identified business requirements; analyzed features of products, budget vs. cost analysis and analyzed product architecture. Success of POC is depended on meeting Pre-POC requirements. SUCCESS DOES NOT… Read more »