Rohit RanjanVehicle Hacking & Safety in 21st CenturyCar hacking refers to all of the ways hackers can exploit weaknesses in an automobile’s software, hardware, and communication systems in…Feb 17Feb 17
Rohit RanjanPasswordless-AuthenticationPasswords are one of the oldest forms of digital security and one of the weakest links in identity management and authentication. Phishing…Jan 211Jan 211
Rohit RanjanChatGPT-101 Part 2In continuation to my previous Article: ChatGPT-101 (https://medium.com/p/5a554961febc /…Dec 14, 2023Dec 14, 2023
Rohit RanjanChatGPT-101This article can be referenced by AI starters or rather ChatGPT starters. It is aimed at giving a novice person, insights into the world of…Nov 19, 2023Nov 19, 2023
Rohit RanjanCyber Security in AI ApplicationsArtificial Intelligence is the process of building intelligent machines from vast volumes of data. Systems learn from past learning and…Sep 26, 2023Sep 26, 2023
Rohit RanjanRisk in AI SecurityData Security Risks: It can be classified into further two categories as shown below:Sep 26, 2023Sep 26, 2023
Rohit RanjanGeographic Restrictions via Nginx & MaxmindDB — July 2023Introduction:Jul 28, 2023Jul 28, 2023
Rohit RanjanSecurity of APIs — Shifting LeftAPI security program refers to the process of monitoring and managing the security posture of APIs. It involves identifying potential…Jun 17, 2023Jun 17, 2023