sumit kumar

Day 6 – IoT Protocols: MQTT, CoAP, HTTP Explained

Scene: Two IoT engineers, Ravi (20 years in embedded systems, pragmatic and detail-oriented) and Ananya (10 years in networking and cloud architecture, futuristic thinker), are sitting at CuriosityTech.in’s IoT Lab in Nagpur, guiding a group of young engineers. They’re discussing what transport and application-layer protocols make IoT devices “talk” effectively. Ravi: Defining Protocols Without the […]

Day 6 – IoT Protocols: MQTT, CoAP, HTTP Explained Read More »

, , , , ,

Day 6 – Common Cyber Threats: Malware, Phishing, Ransomware Explained

During my consulting years at CuriosityTech.in in Nagpur, I often encountered companies who believed: “We are too small to be hacked.” Yet, every time reality proved otherwise. Attackers don’t discriminate; they automate. And among the thousands of threat types, three dominate the danger landscape: Malware, Phishing, and Ransomware. This blog is structured as a Problem–Solution

Day 6 – Common Cyber Threats: Malware, Phishing, Ransomware Explained Read More »

, , , ,