Wi-Fi Security: Risks, Protocols, and Best Practices Post date January 13, 2025 Post author By Alexander S. Ricciardi Post categories In information-security, information-technology, network-security, wifi
Best Practices for Securing Cloud Environments Against Cyber Threats Post date November 12, 2024 Post author By Advait Patel Post categories In cloud-security, cybersecurity-best-practices, data-encryption, data-protection, digital-privacy, identity-access-management, information-security, security-audit
Google Dorking: A Hacker’s Best Friend Post date October 21, 2024 Post author By Satyam Pathania Post categories In computer-hacking, dorking-commands, google-dorking, google-dorks, google-hacking-database, google-hacks, information-security, infosec
Centralization as a Factor Constraining the Development of Secure Communications Post date October 3, 2024 Post author By Crypto Cat Post categories In centralization, communication, coordination, decentralization, Governance, information-security, optout, system
AI’s Growing Role in Cybersecurity Post date September 19, 2024 Post author By Alex Vakulov Post categories In ai, ai-in-cybersecurity, cyber-security-automation, cybercrime, information-security, neural-networks, phishing-attacks, threat-detection
Data Analysis Applied to Auto-Increment API fields Post date June 28, 2024 Post author By Ivan Mochalov Post categories In api, auto-increment-columns, cyber-security, data-analysis, data-scraping, data-security, information-security, sql-database
Software & Data Architecture: Part 2 Post date February 1, 2023 Post author By Sitepen Post categories In data-modeling, Enterprise Apps Development, information-security, Software Architecture Design, Software Development Life Cycle
Software & Data Architecture: Part 1 Post date January 24, 2023 Post author By Sitepen Post categories In data-modeling, Enterprise Apps Development, information-security, Software Architecture Design, Software Development Life Cycle
Being ‘Chief Geek’ and Running 15 Websites with Noonies Nominee Mathias Hellquist Post date November 4, 2021 Post author By Mathias Hellquist Post categories In big-data, data-security, information-security, interview, noonies-nominees, noonies2021, privacy, vpn, web-monetization
Ensuring Security: A Guide for Web and Mobile Application Development Post date August 27, 2021 Post author By Nilton De Lima Post categories In authentication, authorization, cyber-security, engineering-security, information-security, security, security-token, web-development
Phone Scams: What Is Vishing And How You Can Avoid It Post date August 4, 2021 Post author By Check Point Software Post categories In checkpoint, cyber-security, data-breach, good-company, information-security, phishing, vishing, voice-phishing
Manage Your Emails Like You Manage Your Passwords Post date July 29, 2021 Post author By Corvo Post categories In data-privacy, data-protection, email, email-security, information-security, password-protection, password-security, security
From Passwords to Passwordless Authentication Post date May 6, 2021 Post author By Irfan Shakeel Post categories In authentication, cybersecurity, information-security, information-technology, multifactor-authentication, password-security, passwords, security
Signal Protocol — Open Source, Private, Encrypted Mobile Messaging App Post date April 18, 2021 Post author By Madhav Kunal Post categories In data-privacy, information-security, messaging, messaging-app, mobile-app-development, mobile-apps, open source software, signal
ISO/IEC 27035: The Incident Security Incident Management Guide Post date March 18, 2021 Post author By Mr.Vic Post categories In cyber-security-awareness, cybersecurity, incident-management, information-security, iso-standards, privacy, security, technology, web-monetization
Understanding The Importance of SOC2 Compliance for Data Centers Post date February 21, 2021 Post author By Narendra Sahoo Post categories In audit, compliance, cybersecurity, data-centers, data-secuity, information-security, soc, soc2-compliance
I Hacked My Coffee Shop and Accessed My Data: Hacking Your Application May Be Easier Than You Think Post date February 19, 2021 Post author By Omer Post categories In cyber-security, data-security, devops, devops-security, ethical-hacking, ethical-responsibility, information-security, security
Helpful Strategies to Combat WhatsApp Security Threats Post date February 18, 2021 Post author By shigraf Aijaz Post categories In cybersecurity, end-to-end-encryption, facebook, information-security, reverse-engineering, whatsapp, whatsapp-privacy-policy, whatsapp-web-malware
A Free Beginner’s Guide to DNS Security for Work From Home (WFH) Post date February 18, 2021 Post author By Zen Chan Post categories In cyber-security, dns-protection, information-security, prevent-dns-leak, remote-working, remote-working-tips, security, web-monetization, work-from-home
The SIM Swap Attack : Addressing This Identity Fraud Problem Post date February 13, 2021 Post author By Vince Tabora Post categories In cyber-security-threats, cybercrime, cybersecurity, hacking, identity-theft, information-security, sim-cloning, sim-swap, web-monetization
Understanding SIM Swapping Attack s: An Identity Fraud Problem Post date February 13, 2021 Post author By Vince Tabora Post categories In cyber-security-threats, cybercrime, cybersecurity, hacking, identity-theft, information-security, sim-cloning, sim-swap, web-monetization