Of Honeypots, Decoys and Red HerringsBy Manoj Rai On 9 Feb 2016
A look at cyber- threats The number of apps on your phone is directly proportional to how tech-savvy you can be. Ask any millennial and they will “app” a problem for you. Want to find your lost keys? Want to...
How Do You Solve a Problem Like Cyber Security?By Manoj Rai On 7 Dec 2015
Happiest Minds UK discusses the new-age deception technologies UK businesses should adopt to bolster their cyber-security defences The recent TalkTalk cyber-security breach has brought the issue of security firmly back into the public’s psyche and has put both government and...
Mobile App Security – Emerging Threat LandscapeBy Manoj Rai On 8 Jul 2015
Mobile apps have been increasingly gaining ground in the communication industry. Enterprises are rapidly adopting innovative mobile applications to transform their business capabilities as the mobile presence is critical for businesses to attract, retain and communicate with customers; it has...
Static Code Analysis for Enterprise ApplicationsBy Manoj Rai On 6 Jul 2015
The increase in adoption of Social, Mobile, Analytics, and Cloud (SMAC) technologies and growth in data volumes has led to increased concerns about data security. With large enterprises building or deploying new applications using public cloud platforms, there are doubts...
Why it is critical to pen test your ERP systemBy Manoj Rai On 6 Jul 2015
An ERP system is really at the heart of any organization. It enables and facilitates all critical business processes human resources management, financial planning, product management, and more. More importantly, it holds all the data critical to the organization financial...
These blogs might interest you
by Deepti Moolya on 28 Jun 2022
by Sundar Ramaswamy on 2 Jun 2022
by Adarsh BU on 25 May 2022
by Chamale Shettar on 28 Apr 2022
Subscribe for blog updates