|
|
|
|
| Phoram Mehta is an information security architect at PayPal, Inc. in San Jose, CA. He has over 10 years of experience in network, systems, and security engineering. At his current job, he provides advisory services in the areas of enterprise security architecture, compliance, risk management, and monitoring. His research interests range from applied cryptography and wireless networks to secure development for the Web and mobile Web. He has bachelor’s and master’s degrees in computer science and engineering, with a specialization in network security. Phoram also serves on the board of the Silicon Valley chapter of ISSA and holds most major certifications in security. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 49
reviews
|
|
|
|
|
|
|
|
The darknet and smarter crime: methods for investigating criminal entrepreneurs and the illicit drug economy Bancroft A., Palgrave Macmillan, Cham, Switzerland, 2020. 235 pp. Type: Book (978-3-030265-11-3)
“In situations where crime is a value or reward in itself, breaking the law is its own incentive. Crime then can be situationally rational, motivated and meaningful.” Lecturer and researcher Angus Bancroft, with suc...
|
Feb 25 2021 |
|
|
|
|
|
|
How to manage cybersecurity risk: a security leader’s roadmap with Open FAIR Carlson C., Brown Walker Press, Boca Raton, FL, 2019. 308 pp. Type: Book (978-1-627342-76-6)
Most chief information security officers (CISOs)/security risk managers probably wouldn’t join a new organization during, or right after, a breach, hence readers may have to use their imagination to apply some of the advice. ...
|
Dec 25 2020 |
|
|
|
|
|
|
Security and privacy on blockchain Zhang R., Xue R., Liu L. ACM Computing Surveys 52(3): 1-34, 2019. Type: Article
While still controversial in terms of mainstream use, the study, research, and development of all things blockchain has been moving ahead full steam. Interestingly, while distributed ledger technology (DLT) is intrinsically perceived t...
|
May 27 2020 |
|
|
|
|
|
|
Managing cyber risk in the financial sector: lessons from Asia, Europe and the USA Taplin R., Routledge, New York, NY, 2017. 194 pp. Type: Book (978-1-138477-17-9)
I would classify this book as a buffet of articles, studies, research, and references spanning the spectrum of cyber risk domains across various economies around the world. Just like a buffet, there is a lot of very valuable informatio...
|
Jun 7 2019 |
|
|
|
|
|
|
Lightweight, obfuscation-resilient detection and family identification of Android malware Garcia J., Hammad M., Malek S. ACM Transactions on Software Engineering and Methodology 26(3): 1-29, 2018. Type: Article
Malware is undoubtedly one of the most real and potent threats in the smartphone industry. Android’s open ecosystem in terms of code as well as distribution channels is often credited as the primary reason for its popularity ...
|
Jun 22 2018 |
|
|
|
|
|
|
Designing cyber insurance policies in the presence of security interdependence Khalili M., Naghizadeh P., Liu M. NetEcon 2017 (Proceedings of the 12th Workshop on the Economics of Networks, Systems and Computation, Cambridge, MA, Jun 27, 2017) 1-6, 2017. Type: Proceedings
With the cyber security landscape changing drastically, security executives and actuaries have for the last few years been trying to figure out if there is a viable business model in which, given the right conditions, both sides can fi...
|
Apr 25 2018 |
|
|
|
|
|
|
A survey on systems security metrics Pendleton M., Garcia-Lebron R., Cho J., Xu S. ACM Computing Surveys 49(4): 1-35, 2017. Type: Article
As information security becomes a mainstream discipline and is talked about on primetime news and in cafes, among the first questions after the dust around the breach of the day settles would be whether we are secure, and how we measur...
|
Aug 3 2017 |
|
|
|
|
|
|
Toward engineering a secure Android ecosystem: a survey of existing techniques Xu M., Song C., Ji Y., Shih M., Lu K., Zheng C., Duan R., Jang Y., Lee B., Qian C., Lee S., Kim T. ACM Computing Surveys 49(2): 1-47, 2016. Type: Article
Android has clearly surpassed every other mobile operating system in terms of popularity, adoption rates, and alternative uses (Internet of Things, IoT). With mobile malware increasing faster than mobile commerce (mCommerce), it is wor...
|
Mar 9 2017 |
|
|
|
|
|
|
Reusable knowledge in security requirements engineering: a systematic mapping study Souag A., Mazo R., Salinesi C., Comyn-Wattiau I. Requirements Engineering 21(2): 251-283, 2016. Type: Article
Data breaches, zero-day vulnerabilities, and attacks exploiting components core to global information technology (IT) infrastructure have become a mainstay of technology news over the last couple years. Researchers and practitioners al...
|
Jul 22 2016 |
|
|
|
|
|
|
Measuring and managing information risk: a FAIR approach Freund J., Jones J., Butterworth-Heinemann, Newton, MA, 2015. 408 pp. Type: Book
Recent advancements in technology have made it extremely easy to enable commerce from the couch, provision multimedia communication among people around the world, and offer personalized services based on individual preferences. As a re...
|
Jul 11 2016 |
|
|
|
|
|
|
|
|
|
|
|