Miss the “C” Word and be doomed

Secure SDLC in the PCI DSS Ver 3.2 Ambit: “Compliance Management ( the “C” Word) I recently attended a conference where a discussion started on how the PCI DSS Standard meshed [...]


Data Exploration: finding the treasure in the Data Lake


Let Data Flow Securely through the Lake

In the previous blog post, Avadhoot Agasti introduced the data lake and described how the formation of a data lake aims to solve the impedance mismatch and bridge the gap between data producers [...]


Security Considerations for the End-to-End IoT Platform

Securing things. Everything. Connected to the Internet. Simple enough, right? IoT security is a vast topic, with a lot of research going on, a lot of literature available, and a lot of different [...]