mobile

Security review of complex IT systems

Security review of complex IT systems like OAuth, multi factor authentication, cloud platforms, webapplications and mobile applications.