Author: hughessystique

In today’s IoT and internet landscape, there are new kinds of risks and problems emerging at every hour of every day when organizations are operating online. It has become much... Read More

Enterprises across the globe are aware that cybercriminals do not follow standard working hours to strike an attack on a company’s cyber assets. They are known to act swiftly on... Read More

Test tool selection largely depends on the technology that the AUT is built on. A specific test tool might be pretty popular in its own space but might fail to... Read More

Most of the security protocols today employ a combination of symmetric key encryption and asymmetric key encryption. Asymmetric key algorithms are computationally expensive but provide ease of use since their... Read More

A smart city employs information and communication technology (ICT) to boost operational efficiency, make info accessible to the public, and improve public services and citizen welfare. Its purpose is to... Read More

Two decades ago, a popular belief about the applications of AI was that AI would first emerge as a tool to replace humans in activities requiring manual labour- mechanically, followed... Read More

Hospitality has been a part of human culture for millennia. With the evolution of industries and the addition of newer technologies, the hospitality industry has evolved as well, and the... Read More