PinnedPublished inSystem WeaknessDPDP: From Buzzword to Reality: A Long-Term Practical Approach in IndiaThis won 2nd place in ISACA whitepaper contest.Sep 2, 2024Sep 2, 2024
Genuine Happiness in Others’ Success: The Freedom of Celebrating Without EnvyWe live in a competitive world, where success is measured in likes, followers, and views it can be challenging to genuinely feel happy for…6h ago6h ago
Is ISO 27001 Sufficient for DORA Compliance?DORA is a regulation, meaning it applies uniformly across all EU member states without the need for national transposition. It focuses on…5d ago5d ago
Published inMr. Plan ₿ PublicationAIBOM: Understanding the Bill of Materials for AI Systems very simplyInspiration from original article hereJan 9Jan 9
Published inDev GeniusDocker in Google Cloud: Comparing GKE, Cloud Run, and GCE for Business Use CasesGoogle Cloud Platform (GCP) offers a range of powerful tools for deploying, managing, and scaling docker containers in the cloud. In this…Dec 31, 2024Dec 31, 2024
Published inMr. Plan ₿ PublicationScreen-o-mania : Are we forgetting to live?In today’s world ,screens have become an integral part of our daily lives. From smartphones to computers, televisions to tablets, we find…Dec 23, 2024Dec 23, 2024
Published inMr. Plan ₿ PublicationThe GPT era , thoughtlessness era?AI is here to stay and its solving real world problems in medical domain.AI is revolutionizing healthcare by enabling faster disease…Dec 18, 2024Dec 18, 2024
Published inSystem WeaknessUnderstanding SAST and DAST: For DummiesStatic Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), both aim to enhance application security, they…Dec 13, 20241Dec 13, 20241
Published inSystem WeaknessPrivacy by Design: A Modern Approach to Data ProtectionWith regulations on data protection coming in all over the world, protecting personal data has become more crucial than ever.We should…Dec 12, 2024Dec 12, 2024
Published inSystem WeaknessSecuring Virtual Machines in the Cloud: Guide for AWS, Azure, GCP, and OCIIn today’s cloud-centric world, ensuring the security of virtual machines (VMs) is very important aspect of cybersecurity program. Whether…Dec 10, 2024Dec 10, 2024