Image
computer-phone-hands.jpg
Guidelines
Update: 10/12/2025

How to keep control of your mobile devices?

In this paper, we will talk about the best practices and technologies involved with Mobile Device Management (MDM) technologies on mobile devices. They aim to protect data that leaves the security of the corporate network as well as personal data.

Link to How to keep control of your mobile devices?
Image
binary-958952_1920.jpg
Guidelines
Update: 10/12/2025

My Vulnerability Testing Toolbox

If not patched and looked after regularly, a company network infrastructure and website will present flaws or weaknesses, called vulnerabilities, that can be exploited by an opponent to cause damage or perform unauthorized actions. This could result in compromising the confidentiality (e.g. private information leakage), the integrity (e.g. unauthorized modification of data), or the availability (e.g. website down) of resources.

Link to My Vulnerability Testing Toolbox