PinnedSecure & Free access to your home resources from the Internet.Step-by-step guide for free and secure Remote Access via TLS Tunnel, configured within 20 minutes designed for non-technical users.Mar 12, 2024Mar 12, 2024
PinnedDeath of Internet by thousand cuts.Splinternet / Internet balkanization risks and a solution that involves Internet entities in Internet management. 3 minutes Internet…Mar 24, 20232Mar 24, 20232
PinnedKPIs vs. KRIs — A Cybersecurity Viewpoint-This brief write-up is to discuss the features of Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs) from cybersecurity…Apr 9, 20212Apr 9, 20212
Unmasking Data Privacy: A Comparative Analysis of Data Masking, Synthetic Data, and…Data breaches cost organizations an average of $4 million globally, and by the end of 2025, 30% of critical infrastructure organizations…6d ago6d ago
Published inLife WikiPart-2: Unlocking the Necessity and Advantages of Implementing Zero Trust Architecture (ZTA)Zero Trust Architecture (ZTA) is a three parts discussion as below:Feb 14Feb 14
Zero-Trust Architecture Rollout PlanZTA rollout steps prelude for your quick reference and success.Dec 6, 2024Dec 6, 2024
Part-2: Quantum Computing DemystifiedNo Medium subscription, you may read from here.Nov 29, 2024Nov 29, 2024