14633273_10210700617655820_4121757570623647944_o

Dr. Muhammad Malik

769 0

14633273_10210700617655820_4121757570623647944_oCo-Founder and Editor-in-Chief Information Security Buzz

Dr. Muhammad Malik is renowned security evangelist with a record of achievement improving security posture of organizations through proven leadership in information security marketing, startegy, architecture and innovation for industry leaders IBM, EDS, HP, KPMG and Optus. Recipient of a PhD in Computer Science and Engineering from UNSW, Australia as well as Graduate Diploma in Management from AGSM, Australia with numerous technical certifications in Security: CISSP, CISM and CISA.



Articles by Dr. Muhammad Malik

5g-security

Security Challenges in Next Generation 5G Mobile Networks

5G technology is the next step in the development of mobile communication. 5G will not only provide voice and data communication but also provide capabilities for new technologies such as Internet of Things. 5G is no longer confined to provide faster mobile services for voice and data communication but instead it will serve vertical industries, …

0 comments
email-security

Email Gateway – Best Defend Against External Email Threats

An email gateway (aka external SMTP server) is a server where all incoming and outgoing emails are processed and typically provide the following service: Anti-virus scanning on all inbound and outbound emails Anti-spam Management Quarantine Email Company email policy implementation such as message size permitted, allowable type of attachments, etc. Automatic logging and archiving of …

0 comments
Will Insecure Web Applications Dominate 2016’s News?

Will Insecure Web Applications Dominate 2016’s News?

Ilia Kolochenko, CEO of High-Tech Bridge on the recent story about Citrix’s CMS being hacked into, which he believes should focus more on the insecurity of web applications than the Russian hacker angle. Ilia feels so strongly about web application reliability and compliance that his company has launched a free SSL/TLS security testing service and …

0 comments
sdn and security threats

Security Threats to Software Defined Network (SDN)

In Software Defined Network (SDN) architecture, the control plane is separated from the data plane and implemented in a software application. In this blog, we will briefly analyze the security threats to SDN because of this decoupling. The controller is the most vital component in SDN architecture mainly because it defines the data flows that occur …

0 comments