Data Privacy
YOUR BEST BET AT EFFECTIVE DATA PRIVACY More data is being produced than ever before, and that amount will only
Read MoreYOUR BEST BET AT EFFECTIVE DATA PRIVACY More data is being produced than ever before, and that amount will only
Read MoreRANSOMWARE ATTACKS - SHOULD YOU PAY? Ransomware attacks have been on the rise across the globe. With major enterprises and
Read MoreWith over 20 years of experience in programming, network security, digital forensics, malware research, cryptography design, cryptanalysis, counterintelligence, protocol exploitation,
Read MoreAbstract Shellcode is often used as a means to achieve arbitrary execution. In Windows, this involves the use of WinAPI
Read MoreMuch has been written about the need for equality in cybersecurity. “Women and men should have the same opportunities.” “Having
Read MoreEver lost your baggage during your travels? Someone else take your bag thinking its theirs? Frustrating, right? Not for Nandan!
Read More