A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks
Abstract: In this day and age, Internet has become an innate part of our existence. This virtual platform brings people...
Read more →Abstract: In this day and age, Internet has become an innate part of our existence. This virtual platform brings people...
Read more →By Sanjay Nagaraj, Co-Founder & CTO of Traceable AI You might hear the term “eBPF” mentioned when chatting to DevOps...
Read more →By Héctor Guillermo Martínez, President GM Sectec The COVID-19 pandemic accelerated the adoption of digital payments globally and especially in...
Read more →By Dr. Yvonne Bernard, CTO, Hornetsecurity Criminals are increasingly using fake emails to exploit their victims for financial gain and...
Read more →By Dave Adamson, Chief Technology Officer at EspriaEncourages businesses to re-claim authority over their networks, thereby enhancing cyber-resilience in the...
Read more →By Mark Evans, VP Marketing, Endace Many organizations assume their security tools can see everything that happens across the network...
Read more →Firmware security risks One of the most neglected areas of cyber security is the firmware that underpins every device –...
Read more →By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming...
Read more →What is social engineering? By Jenna Greenspoon, Head of Parenting, Kidas As an avid internet user, it’s likely that at...
Read more →By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall,...
Read more →Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a...
Read more →General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant,...
Read more →