Interview with Prof. Banafa – Part 2
In the first part of the interview with Prof. Ahmed Banafa, he gave us some insights into the rise of
Read moreIn the first part of the interview with Prof. Ahmed Banafa, he gave us some insights into the rise of
Read moreFrom continuous code analysis and change management to vulnerability and compliance assessment, through DevSecOps, coders are developing secure coding processes and
Read moreThe internet of things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life,
Read moreAfter decades of attacks targeting IT networks, the strategic importance of IT cybersecurity is now broadly recognized and nearly every
Read moreAs we continue with the second part of the interview, Dr. Pruthi explains the paradigm shift required to tackle the
Read moreSecurity Services There are five major security goals that are also known as security services and can also be used
Read moreDo iOS apps honour user’s privacy? Protection of user’s privacy by apps has lately emerged as a big challenge. Many
Read more