BLOG

THE PLACE OF BINARY ANALYSIS ON APPLICATION SECURITY

Binary code analysis is a fairly new approach in application security ...

Antriksh Shah

Jan 02, 2018

Security

COMPANIES MUST UNDERSTAND SECURITY IS NO LONGER RESTRICTED TO END-POINTS: SYMANTEC

As an organisation grows in business, infrastructure and resources, it...

HARSH SHAH

Nov 27, 2017

Security

SECURING THE BACKBONE OF YOUR TELECOM NETWORK

Telecom security is still evolving. With voice and video services gett...

Antriksh Shah

Nov 16, 2017

Technology

COMMON VULNERABILITIES IN SAP AND WHY IT NEEDS TO BE A BIGGER CONCERN

SAP enterprise applications are the core of any large scale company. E...

Divya Agrawal

Nov 07, 2017

Technology

Antriksh Shah

Jan 02, 2018

THE PLACE OF BINARY ANALYSIS ON APPLICATION SECURITY

Binary code analysis is a fairly new approach in application security ...

HARSH SHAH

Nov 27, 2017

COMPANIES MUST UNDERSTAND SECURITY IS NO LONGER RESTRICTED TO END-POINTS: SYMANTEC

As an organisation grows in business, infrastructure and resources, it...

Antriksh Shah

Nov 16, 2017

SECURING THE BACKBONE OF YOUR TELECOM NETWORK

Telecom security is still evolving. With voice and video services gett...

Divya Agrawal

Nov 07, 2017

COMMON VULNERABILITIES IN SAP AND WHY IT NEEDS TO BE A BIGGER CONCERN

SAP enterprise applications are the core of any large scale company. E...

Antriksh Shah

Jan 02, 2018

THE PLACE OF BINARY ANALYSIS ON APPLICATION SECURITY

Binary code analysis is a fairly new approach in application security ...

HARSH SHAH

Nov 27, 2017

COMPANIES MUST UNDERSTAND SECURITY IS NO LONGER RESTRICTED TO END-POINTS: SYMANTEC

As an organisation grows in business, infrastructure and resources, it...

Antriksh Shah

Nov 16, 2017

SECURING THE BACKBONE OF YOUR TELECOM NETWORK

Telecom security is still evolving. With voice and video services gett...

Divya Agrawal

Nov 07, 2017

COMMON VULNERABILITIES IN SAP AND WHY IT NEEDS TO BE A BIGGER CONCERN

SAP enterprise applications are the core of any large scale company. E...

Antriksh Shah

Jan 02, 2018

THE PLACE OF BINARY ANALYSIS ON APPLICATION SECURITY

Binary code analysis is a fairly new approach in application security ...

HARSH SHAH

Nov 27, 2017

COMPANIES MUST UNDERSTAND SECURITY IS NO LONGER RESTRICTED TO END-POINTS: SYMANTEC

As an organisation grows in business, infrastructure and resources, it...

Antriksh Shah

Nov 16, 2017

SECURING THE BACKBONE OF YOUR TELECOM NETWORK

Telecom security is still evolving. With voice and video services gett...

Divya Agrawal

Nov 07, 2017

COMMON VULNERABILITIES IN SAP AND WHY IT NEEDS TO BE A BIGGER CONCERN

SAP enterprise applications are the core of any large scale company. E...