Posted on 12/28/201212/06/2013 Protect Your Communication Using Free Tools: Secure E-mail and Hiding Messages with Steganography
Posted on 12/18/201212/06/2013 Beating Signature Based Security – Dynamic Software That Obfuscates Malware
Posted on 12/15/201104/24/2014 Addressing Bring Your Own Device (BYOD): How to manage and secure mobile endpoints