After the dust settled over Indian government’s demonetization scheme, the discussions on security systems of digital payments started making rounds.
Read more...
My Blog List
-
New Microsoft identity and data security capabilities to accelerate CMMC
compliance for the Defense Industrial Base
-
Microsoft introduces new capabilities in Microsoft Entra ID and Microsoft
Purview that support CMMC compliance while also helping Defense Industrial
Base...
9 months ago
-
Data Mining, Sandbox, Malware Classifier & Adversary Emulation
-
Data driven analysis to achieve any business or strategic goal, also
commonly referred as Data Mining, is like finding a needle in a haystack.
But when the...
5 years ago
-
BIOS Boots What? Finding Evil in Boot Code at Scale!
-
The second issue is that reverse engineering all boot records is
impractical. Given the job of determining if a single system is infected
with a bootkit,...
5 years ago
-
DellEMC Release of VMware vSphere 6.7
-
This blog post is written by Vijay Kumar from Hypervisor Engg. Dell EMC
VMware vSphere 6.7 is the next major release after the update release
vSphere 6.5 U...
5 years ago
-
The Culture Code of a Veteran
-
*Results, **Winning together, **Integrity, **Customers, and **Innovation.*
Five statements that embody Dell’s Culture Code. Interestingly, they also
ali...
7 years ago
-
0 comments:
Post a Comment