Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Phoram Mehta
Santa Clara, California

Phoram Mehta is an information security architect at PayPal, Inc. in San Jose, CA. He has over 10 years of experience in network, systems, and security engineering. At his current job, he provides advisory services in the areas of enterprise security architecture, compliance, risk management, and monitoring. His research interests range from applied cryptography and wireless networks to secure development for the Web and mobile Web.

He has bachelor’s and master’s degrees in computer science and engineering, with a specialization in network security. Phoram also serves on the board of the Silicon Valley chapter of ISSA and holds most major certifications in security.


The darknet and smarter crime: methods for investigating criminal entrepreneurs and the illicit drug economy
Bancroft A.,  Palgrave Macmillan, Cham, Switzerland, 2020. 235 pp. Type: Book (978-3-030265-11-3)

“In situations where crime is a value or reward in itself, breaking the law is its own incentive. Crime then can be situationally rational, motivated and meaningful.” Lecturer and researcher Angus Bancroft, with such simple yet deep ob...


Security and privacy on blockchain
Zhang R., Xue R., Liu L.  ACM Computing Surveys 52(3): 1-34, 2019. Type: Article

While still controversial in terms of mainstream use, the study, research, and development of all things blockchain has been moving ahead full steam. Interestingly, while distributed ledger technology (DLT) is intrinsically perceived to be more se...


How to manage cybersecurity risk: a security leader’s roadmap with Open FAIR
Carlson C.,  Brown Walker Press, Boca Raton, FL, 2019. 308 pp. Type: Book (978-1-627342-76-6)

Most chief information security officers (CISOs)/security risk managers probably wouldn’t join a new organization during, or right after, a breach, hence readers may have to use their imagination to apply some of the advice. Having said that...


Lightweight, obfuscation-resilient detection and family identification of Android malware
Garcia J., Hammad M., Malek S.  ACM Transactions on Software Engineering and Methodology 26(3): 1-29, 2018. Type: Article

Malware is undoubtedly one of the most real and potent threats in the smartphone industry. Android’s open ecosystem in terms of code as well as distribution channels is often credited as the primary reason for its popularity and mass adoptio...


A survey on systems security metrics
Pendleton M., Garcia-Lebron R., Cho J., Xu S.  ACM Computing Surveys 49(4): 1-35, 2017. Type: Article

As information security becomes a mainstream discipline and is talked about on primetime news and in cafes, among the first questions after the dust around the breach of the day settles would be whether we are secure, and how we measure whether we...


Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy