AI in Cybersecurity: Should we be excited?I venture into this article with a disclaimer. The thoughts here are personal and based on my understanding of the situation as it exists…Apr 16Apr 16
HTTP/3 — Challenges to security and possible responseIt’s been a year since RFC 9114, defining HTTP/3 was published. I have been interested and tracking this technology for some time, because…Aug 15, 20231Aug 15, 20231
Do we need an ONDC for Cybersecurity?A few decades ago, to withdraw, when bank ATMs got introduced, you could transact only in your own bank’s ATMs. In 1997, the concept of…Aug 21, 2022Aug 21, 2022
Where Passions Collide….in a good way!I have been an avid Formula1 fan for decades now. What started out as any other fad, and the joy of watching fast super cars racing each…Aug 12, 2022Aug 12, 2022
The Ransomware SagaCOVID-19 hit the world bad and has been causing mayhem and disruption globally since early 2020. Guess what, the digital world has also…Sep 10, 2021Sep 10, 2021
Modern Cyber Defense — Part 7 — Extended Detection & Response (XDR)2021 is the year of XDR. There’s a mad rush to release products in this category. The recently concluded RSA Conference saw a flurry of…Jun 15, 2021Jun 15, 2021
Protecting your digital persona, cause nobody else will do it for youJust one website https://haveibeenpwned.com/ lists 11,389,527,466 pwned accounts. The world population is only 7.8 billion. That’s multiple…Jun 12, 2021Jun 12, 2021
Modern Cyber Defense — Part 5-Orchestration & AutomationI have been writing these series of blogs on Modern Defense trying to cover multiple aspects. While you may read this article…Apr 18, 2021Apr 18, 2021