🌍 Embrace Advancement: Complement, Don’t Write Off! 🚀In a world driven by constant innovation, we often witness an all-too-common phenomenon: the swift dismissal of technologies, programming…Jun 18, 2023Jun 18, 2023
Anatomy of a JavaScript VirusA computer virus is perhaps one of the most dreaded programs in todays digital age. Viruses, like most other malware, are conceptualized as…Nov 16, 2021Nov 16, 2021
Nash Equilibrium : Deviate from the optimalNash Equilibrium defines a simple yet very powerful aspect of interacting entities in a group. It states a solution set of a game…Oct 22, 2021Oct 22, 2021
Zero Trust — The need to Secure IntelligentlyOne of the buzz-words recently catching attention in digital security is Zero Trust. There are Zero Trust approaches, Zero Trust networks…Nov 16, 2020Nov 16, 2020
Disaster Recovery — The Cloud might NOT be enough!Let us talk about the very basic requirement of information backup — Disaster Recovery. If your backup cannot fulfill this one simple yet…Nov 5, 2020Nov 5, 2020
IoT & Cloud — That concept called SecurityViewing The Perfect Weapon recently, I could not stop myself comparing it to a lot of similar documentaries that were made over the years…Nov 5, 2020Nov 5, 2020