Home Search

ravi das - search results

If you're not happy with the results, please do another search

The Use of Social Media in the Workplace (Part 1)

0
Gone are the days when a business would have to spend hundreds of thousands of dollars on radio and television ads to showcase their...

The Concept of Layered Security (Part 3)

0
The previous article in this series illustrated why a layered security approach to Cybersecurity is important from the standpoints of both a business/enterprise and...

The Concept of Layered Security (Part 2)

0
Ravi Das kicked off this series by explaining the basics of taking a layered approach to Cybersecurity. In this article, he explains why a...

The Concept of Layered Security (Part 1)

0
In the traditional model of overall Cybersecurity, only one layer of defense has been used.  This is most commonly associated with that of legacy...

Biometrics and the Zero Trust Framework (Part 5)

So far, this series has covered various biometric modalities that can be used with the Zero Trust Framework. This final article pulls it all together by...

Biometrics & the Zero Trust Framework (Part 3)

So far, this series has introduced the concept of the Zero Trust Framework (ZTF), how it compares to other Cybersecurity measures, and its advantages...

Biometrics & The Zero Trust Framework (Part 1)

Introduction: Our Nemesis - The Password Since the advent of technology, there has been one common denominator that has been a great impediment to further...

The Role of Artificial Intelligence in Cybersecurity (Part 5)

0
This series has examined what Artificial Intelligence (AI) actually is, its components, as well as its relevance and importance to Cybersecurity.  You may be...

The Role of Artificial Intelligence in Cybersecurity (Part 2)

0
The first article in this series provided a clear definition of what Artificial Intelligence (AI) is and an overview of its use in Cybersecurity....

The Role of Artificial Intelligence in Cybersecurity (Part 1)

0
One thing that Corporate America can be certain of in the future is that Cyberthreats and their attackers will abound, stealthier and more covert...