![Bhumish Gajjar](/img/author_hu02e7525e7086a19c15a31028373d3111_768251_288x288_fill_q100_box_center.jpg)
![Bhumish Gajjar](/img/author_hu02e7525e7086a19c15a31028373d3111_768251_288x288_fill_q100_box_center.jpg)
Recent
MFA - Why do we match numbers to approve MFA sign-in?
·3 mins
In our MFA Authenticator apps, now we need to enter numbers shown during login - why did the vendors enforce this? To stop MFA bombarding attacks.
Building an Effective Vulnerability Management Program
·6 mins
Unleashing the Risk Based Vulnerability Management, a security update to your traditional VM Process
Security Considerations for Smart Cameras
·9 mins
Designing smart-iot cameras? Read this to check out the security perpective
An Innovative Email Verification Technique for Spam
·3 mins
Received a spam mail. Dissected the links to find something new!
Set-up Penetration Testing server on AWS
·6 mins
Story of how I hosted the Android’s AppInventor project on a Google AppEngine