Shadow IT

Quite recently, I submitted an assignment on “Shadow IT”. I want to share some of its data with the blog readers. According to Forcepoint.com [1], “Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval”. E.g. BYOD, use of cloud services like Dropbox, Google Drive, One […]

Why I am writing about Security Engineering?

During education at the school, college and universities, my majors were in the field of Science/Computing/IT/Engineering. Specifically, at the University of Oxford, I attended a course with the title of Security Principles which was taught by Professor. Andrew Martin. For prestudy, I read the first few chapters of a book with the title of Security […]