Feed Post

More like this

Recommendations from Medial

Anonymous
Image Description
Image Description

What do you think about the upcoming generation? I see kids are equipped with mobile phones and they love watching reels and short videos too much. What do you see coming?

17 replies15 likes

Harshavardhan Golamari

Stealth • 5m

I don't know much about recent tax payment for business and rich people but I have recently started to see in media platform complain about rich people leaving the country. Can anyone explain what was the problem?

0 replies2 likes
Image Description

Abhishek Chettri

Stealth • 6m

What is the key skills of cyber security experts?

1 replies5 likes
Anonymous
Image Description

I am a jr software Full stack developer, let's say i have skills to build a WhatsApp like application(web based) atleast with 80% exact features in about 4 months, with decent code quality, scalability, security, and architecture. What would you rate

See More
1 replies3 likes
Image Description
Image Description

Aditya

Stealth • 4m

See the same review at same date and the difference is in only usage time and name . What do you think about this . Is this a strategy or what clarify it ..

6 replies8 likes
1
Image Description

Ashutosh C. shah

Stealth • 6m

What are challenges are you gyes facing to get started as a security auditor or QA job , let me know if I could help on some case 🤔 I am working as bug hunter form 3 years and also have 5 year job experience as senior security researcher.

5 replies6 likes

Vasvi Seth

Stealth • 5m

Security Posture: Essential for Safeguarding Critical Assets and Data 🛡️ In today's ever-evolving digital landscape, safeguarding critical assets and data is paramount. Your organization's security posture determines its ability to defend against t

See More
0 replies3 likes

Vasvi Seth

Stealth • 5m

Compliance is the cornerstone of organizational integrity. It's not just about ticking boxes; it's about upholding internal standards and external regulations. It's the shield against fines and security breaches.

0 replies2 likes

Himesh Jain

Stealth • 2m

Recently Read about Kite generators and Kite energy, really a fascinating concept. Already got the recipe let's see what we can cook 😁

0 replies4 likes
Image Description
Image Description

Viyasan S

Stealth • 6m

I got an Idea to create a Mobile Security app for to prevent from cyberattacks . What is your opinion and tell the features you want as a customer Thankyou

10 replies8 likes

Download the medial app to read full posts, comements and news.