Category: Cyber Security

Encryption of “Data in Use”

Encryption is a critical security measure for protecting data at rest and in transit, but what about data in use? Encrypting data in use, also known as “in-memory encryption,” is a technique for protecting data while it is being processed...

Fallacies of Cybersecurity: Debunking Common Misconceptions

  As our world becomes increasingly digital, cybersecurity has emerged as a critical aspect of modern society. Despite its importance, there are numerous misconceptions and fallacies surrounding cybersecurity. These misunderstandings can lead to a false sense of security and weaken...

Top 10 Hot Cybersecurity Topics

I’ve been asked quite frequently as what are the top 10 cybersecurity topics that one must read while pursuing his / her learning journey. Here is a short list (Keep in mind that cybersecurity is a constantly evolving field hence...

Cybercrimes in Smart Cities

A smart city is an urban area that uses advanced technology and data analytics to enhance the quality of life for its citizens, improve the efficiency and sustainability of urban services, and promote economic growth. Smart cities leverage Internet of...

Diagram Description automatically generated

Automated SAST / DAST Pipeline

Automate security checks during application development Figure 1- SAST/DAST Pipeline Architecture DevOps brings together software development and operations to shorten development cycles, allow organizations to be agile, and maintain the pace of innovation while taking advantage of cloud-native technology and...