Research Paper

Securing the Cloud

Where and how our data is composed, processed, accessed, stored, backed up and destroyed is, what is sure to become massively overlaid cloud-based services and ‘by whom’ and ‘using whose infrastructure’ solely yields significant concerns related to security, privacy, compliance and survivability. This paper will show multiple cascading ‘levels of …

Read More »

EDI:lass {EDI: Integration as a Service}

Electronic Data Interchange (EDI) enables businesses to exchange electronic documents easily, efficiently and cost effectively. Documents such as invoices and purchase orders are transmitted from one computer to another in a standardized electronic format. EDI enables you to send and receive business documents with minimal chance for errors and omissions, due …

Read More »

IPS: B/Doom Justified

This publication would address challenges with respect to the security devices thus proving the acumen towards best practises in an IPS world, resulting in guarding a firm against these perpetrating alarming attacks. Also the paper would direct, tips and guidelines for deploying these products from internal to border network environment …

Read More »