Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Mehta, Phoram
PayPal
Santa Clara, California
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Phoram Mehta is an information security architect at PayPal, Inc. in San Jose, CA. He has over 10 years of experience in network, systems, and security engineering. At his current job, he provides advisory services in the areas of enterprise security architecture, compliance, risk management, and monitoring. His research interests range from applied cryptography and wireless networks to secure development for the Web and mobile Web.

He has bachelor’s and master’s degrees in computer science and engineering, with a specialization in network security. Phoram also serves on the board of the Silicon Valley chapter of ISSA and holds most major certifications in security.

 
 
Options:
Date Reviewed  
 
1
- 10 of 49 reviews

   
   The darknet and smarter crime: methods for investigating criminal entrepreneurs and the illicit drug economy
Bancroft A., Palgrave Macmillan, Cham, Switzerland, 2020. 235 pp.  Type: Book (978-3-030265-11-3)

“In situations where crime is a value or reward in itself, breaking the law is its own incentive. Crime then can be situationally rational, motivated and meaningful.” Lecturer and researcher Angus Bancroft, with suc...

Feb 25 2021  
   How to manage cybersecurity risk: a security leader’s roadmap with Open FAIR
Carlson C., Brown Walker Press, Boca Raton, FL, 2019. 308 pp.  Type: Book (978-1-627342-76-6)

Most chief information security officers (CISOs)/security risk managers probably wouldn’t join a new organization during, or right after, a breach, hence readers may have to use their imagination to apply some of the advice. ...

Dec 25 2020  
   Security and privacy on blockchain
Zhang R., Xue R., Liu L. ACM Computing Surveys 52(3): 1-34, 2019.  Type: Article

While still controversial in terms of mainstream use, the study, research, and development of all things blockchain has been moving ahead full steam. Interestingly, while distributed ledger technology (DLT) is intrinsically perceived t...

May 27 2020  
   Managing cyber risk in the financial sector: lessons from Asia, Europe and the USA
Taplin R., Routledge, New York, NY, 2017. 194 pp.  Type: Book (978-1-138477-17-9)

I would classify this book as a buffet of articles, studies, research, and references spanning the spectrum of cyber risk domains across various economies around the world. Just like a buffet, there is a lot of very valuable informatio...

Jun 7 2019  
  Lightweight, obfuscation-resilient detection and family identification of Android malware
Garcia J., Hammad M., Malek S. ACM Transactions on Software Engineering and Methodology 26(3): 1-29, 2018.  Type: Article

Malware is undoubtedly one of the most real and potent threats in the smartphone industry. Android’s open ecosystem in terms of code as well as distribution channels is often credited as the primary reason for its popularity ...

Jun 22 2018  
   Designing cyber insurance policies in the presence of security interdependence
Khalili M., Naghizadeh P., Liu M.  NetEcon 2017 (Proceedings of the 12th Workshop on the Economics of Networks, Systems and Computation, Cambridge, MA, Jun 27, 2017) 1-6, 2017.  Type: Proceedings

With the cyber security landscape changing drastically, security executives and actuaries have for the last few years been trying to figure out if there is a viable business model in which, given the right conditions, both sides can fi...

Apr 25 2018  
   A survey on systems security metrics
Pendleton M., Garcia-Lebron R., Cho J., Xu S. ACM Computing Surveys 49(4): 1-35, 2017.  Type: Article

As information security becomes a mainstream discipline and is talked about on primetime news and in cafes, among the first questions after the dust around the breach of the day settles would be whether we are secure, and how we measur...

Aug 3 2017  
   Toward engineering a secure Android ecosystem: a survey of existing techniques
Xu M., Song C., Ji Y., Shih M., Lu K., Zheng C., Duan R., Jang Y., Lee B., Qian C., Lee S., Kim T. ACM Computing Surveys 49(2): 1-47, 2016.  Type: Article

Android has clearly surpassed every other mobile operating system in terms of popularity, adoption rates, and alternative uses (Internet of Things, IoT). With mobile malware increasing faster than mobile commerce (mCommerce), it is wor...

Mar 9 2017  
  Reusable knowledge in security requirements engineering: a systematic mapping study
Souag A., Mazo R., Salinesi C., Comyn-Wattiau I. Requirements Engineering 21(2): 251-283, 2016.  Type: Article

Data breaches, zero-day vulnerabilities, and attacks exploiting components core to global information technology (IT) infrastructure have become a mainstay of technology news over the last couple years. Researchers and practitioners al...

Jul 22 2016  
   Measuring and managing information risk: a FAIR approach
Freund J., Jones J., Butterworth-Heinemann, Newton, MA, 2015. 408 pp.  Type: Book

Recent advancements in technology have made it extremely easy to enable commerce from the couch, provision multimedia communication among people around the world, and offer personalized services based on individual preferences. As a re...

Jul 11 2016  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy