Rohit RanjanVehicle Hacking & Safety in 21st CenturyCar hacking refers to all of the ways hackers can exploit weaknesses in an automobile’s software, hardware, and communication systems in…6 min read·Feb 17, 2024----
Rohit RanjanPasswordless-AuthenticationPasswords are one of the oldest forms of digital security and one of the weakest links in identity management and authentication. Phishing…6 min read·Jan 21, 2024--1--1
Rohit RanjanChatGPT-101 Part 2In continuation to my previous Article: ChatGPT-101 (https://medium.com/p/5a554961febc /…2 min read·Dec 14, 2023----
Rohit RanjanChatGPT-101This article can be referenced by AI starters or rather ChatGPT starters. It is aimed at giving a novice person, insights into the world of…3 min read·Nov 19, 2023----
Rohit RanjanCyber Security in AI ApplicationsArtificial Intelligence is the process of building intelligent machines from vast volumes of data. Systems learn from past learning and…4 min read·Sep 26, 2023----
Rohit RanjanRisk in AI SecurityData Security Risks: It can be classified into further two categories as shown below:5 min read·Sep 26, 2023----
Rohit RanjanGeographic Restrictions via Nginx & MaxmindDB — July 2023Introduction:2 min read·Jul 28, 2023----
Rohit RanjanSecurity of APIs — Shifting LeftAPI security program refers to the process of monitoring and managing the security posture of APIs. It involves identifying potential…3 min read·Jun 17, 2023----
Rohit RanjanAuthentication v/s AuthorizationI’ve often come across people with a lot of confusion about Authentication & Authorization which is true as there are different types &…7 min read·Feb 11, 2023----