Specialties:
- Information Security of Telecommunication Systems
- Identity and Access Management Systems
- Database Security Administration
- Automated Discovery of Access Control Vulnerabilities
- Security Software Development
We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.
You can read the details below. By accepting, you agree to the updated privacy policy.