5G Phase 2 Security- Associated Threat Model and risk mitigation solutions

Introduction: SA3 group within 3GPP is currently responsible for security in the 5G System including the 3GPP enhancements for IoT and vertical industries. Furthermore, since the introduction of the 5G …

How vulnerable is 5G – security viewpoint

Executive Summary: The blog starts with a question, are we introducing new threat surface in 5G, we have already made radio flattened and split into RU-DU-CU and attach virtualized capabilities …

The Rain Must Fall!

Is this the Yanni’s iconic composition   – it is the time to realize the concept of mother nature while listening to Yanni’s music. Concept: The big question We are …

Securing Applications Hosted on Tomcat or JBoss By Enabling SSL at Proxy/Reverse Proxy

Experienced Solution Architect at Ericsson
Solution Engineer with experience in Software architecture, Solution Design & Software Development, scrum master, conducting architectural evaluation, design and analysis of enterprise-wide system. Motivated leader who leads teams through all phases of software development life cycle.
Md Shamimuddin(Shamim)
Latest posts by Md Shamimuddin(Shamim) (see all)

A major step towards enhancing application security is to safeguard web interfaces of an application by enforcing SSL with proper TLS version and restrict access over non-secure communication over http. …

Product Security Viewpoint

Product security viewpoint

Context: in the era of virtualization, securing application will play a crucial role while deploying product in shared, dedicated or organization tenancy considering data driven nature in the era of …

Runtime Migration Platform

Event Based Runtime migration platform As a Service on Public Cloud

Event Based Runtime Infrastructure As a Service on Public Cloud What and How Space Cloud infrastructure provides the easy way to manage vms including creation/termination and provides language specific api — but what …