1

Miss the “C” Word and be doomed

Secure SDLC in the PCI DSS Ver 3.2 Ambit: “Compliance Management ( the “C” Word) I recently attended a conference where a discussion started on how the PCI DSS Standard meshed [...]

0

Data Exploration: finding the treasure in the Data Lake

0

Let Data Flow Securely through the Lake

In the previous blog post, Avadhoot Agasti introduced the data lake and described how the formation of a data lake aims to solve the impedance mismatch and bridge the gap between data producers [...]

0

Security Considerations for the End-to-End IoT Platform

Securing things. Everything. Connected to the Internet. Simple enough, right? IoT security is a vast topic, with a lot of research going on, a lot of literature available, and a lot of different [...]