Ravi Das

Ravi Das
48 POSTS0 COMMENTS
Ravi is a Business Development Specialist for The AST Cybersecurity Group, a leading security consultancy based in the Greater Chicago area. It is a boutique firm, offering all sorts of cyber services, including that of technical writing and podcasting. The AST Cybersecurity Group has been in business for 11 years, and the website is: www.astcybsersecurity.com

Part 1: Shadow IT Management

Our physical bodies are creatures of habit. It expects us to do keep the same routine on a daily basis.  The same is even...

Part 2: Role of Artificial Intelligence in cybersecurity

The functionalities, or characteristics of an Artificial Intelligence system in cybersecurity As it relates to cybersecurity, there are three main functionalities of an Artificial Intelligence...

Part 1: Role of Artificial Intelligence in cybersecurity

The important trends Artificial Intelligence (AI) can be used in the cybersecurity industry in many ways, which are still yet to be tapped into. Just...

Part 2: Biometrics in The Cloud

Part 1 of the series looked at the Infrastructure as a Service (IaaS), which is the core platform for any biometrics in The Cloud...

Part 1: Biometrics in The Cloud

The Cloud Before we delve any deeper as to what how biometric technology can be deployed into The Cloud, we must first have a basic...

Part 2: Biometric sensors

Touchless fingerprint sensors Once again, as the name implies, there is no direct contact or interface, which is required by the end user. There are...

Part 1: Biometric sensors

An overview into the biometric sensors What exactly is a biometric sensor? It comes in many different shapes and sizes. The type of sensor technology...

Part 2: Social impacts of biometrics

Part 1 of this series was an introduction to the social impacts of biometrics. The overall perception of biometrics One of the biggest factors that affect...

Part 1: Social impacts of biometrics

An introduction to the social implications of biometrics Imagine if you will, a spectrum of all of the security technologies which are out there. This...

Part 3: Security vulnerabilities of e-voting

In the developing nations, such as those primarily found in Africa and Asia, the fundamental right to vote and being counted as a citizen...