Ransomware, a hired weapon
I am pretty sure that you would be a little surprised after reading the title of this post, and...
I am pretty sure that you would be a little surprised after reading the title of this post, and...
We explained OCPP in our 1st post of the EV and OCPP series, you can read that post for...
The most common question in information security assessment is Are you using strong ciphers ? Many IT professional answers it...
Electric Vehicle adoption is increasing day by day, ease of charging electric vehicles is a very important aspect in...
SASL (Simple Access Security Layer) Proxy is one of the identity propagation methods. SASL Proxy Authorization allows authenticated users...