Security Controls Requirements for Aadhaar API providers

With the commencement of Aadhaar project of UIDAI to round up all the citizen of India from centralized data repository of large user database to provide a unique identification of the Indian residents. today i am writing this blog for Aadhaar based authentication service providers…

IOT Communication Protocols

Today we are going to discuss on types  of communication protocols used in IOT devices and also its security aspects. What is the internet of things..? Internet of Things is nothing but the device which is connected with internet and sharing or receiving the data…

SCADA 360° Threat Landscape

Industrial Control System, Supervisory Control and Data Acquisition ICS-SCADA are an important element of the Critical Infrastructure in oil, gas refineries, waste water treatment plant, nuclear factories. With the “Stuxnet” it is proven that cyber criminals, Nation State actors can create a war like scenario…