Category:

IT Security

Top 4 Use Cases of Application Visibility and Control (AVC)

In today’s world when we seek for IoT, IoE, cloud computing, IaaS and various other things, being aware of application is a necessity. When we consider a network system to be deployed for home, enterprise or on a more global...

Top 4 Use Cases of Application Visibility and Control (AVC)
March 9th, 2017

Deep Packet Inspection – A Data Insight

Deep Packet Inspection (DPI) is a technology that allows software/hardware to access, analyze and modify payload (data) portions of network packets. Traditionally network operations like filtering, routing, accounting were based on L3/L4 layer (Network/Transport Layer) headers of the packet. But...

Deep Packet Inspection – A Data Insight
March 2nd, 2017

Ransomware- A Crafty, Dangerous Cyber Threat

Ransomware has been increasing at an alarming rate for over few years, and according to various sources it is estimated around $1 billion was made by cybercriminals. Today's technology has given much sophistication to hackers in getting access to your...

Ransomware- A Crafty, Dangerous Cyber Threat
February 28th, 2017

Top 6 IoT Security Threats

With the advent of connected cars, homes, wearables and many more, Internet of Things (IoT) gains momentum. The number of connected devices is expected to reach 50 billion by 2020. I have already discussed the wide scope of IoT in...

Top 6 IoT Security Threats
August 23rd, 2016

Meet CRO – Investigation Site Tech Challenges with CAS

CROs uses different systems to collect data as part of Clinical Trial process. In this article, I will try to highlight the tech challenges that the various CRO sites face and come up with CAS SSO based solutions to manage...

Meet CRO – Investigation Site Tech Challenges with CAS
August 4th, 2016

MEET OUR BLOGGERS

Follow Us

facebook twitter linkedin google plus youtube Glassdoor

Category

Recent Tweets & Comments

Tweets by @AltenCalsoftLabs