Home Search
ravi das - search results
If you're not happy with the results, please do another search
Physical & Behavioral Biometric Technologies: Part 3
So far, this series has provided an overview of physical and behavioral biometric technologies, as well as guidelines about which technology to use in...
Physical and Behavioral Biometric Technologies: Part 2
We kicked off this series with an overview of two methods used to verify an individual's identity: physical biometrics and behavioral biometrics. Armed with...
Physical & Behavioral Biometric Technologies: Part 1
Today’s biometric technologies are sophisticated methods of proving the identity of an individual. These technologies fall into two broad categories: physical biometrics and behavioral...
Social Media in the Workplace (Part 3)
So far, this series has explained how a the use of social of media makes a business vulnerable to Cyberattackers but how a social...
The Use of Social Media in the Workplace (Part 2)
A previous article explained that while social media has transformed the way companies promote their products and services, it also makes them a target...
The Use of Social Media in the Workplace (Part 1)
Gone are the days when a business would have to spend hundreds of thousands of dollars on radio and television ads to showcase their...
The Concept of Layered Security (Part 3)
The previous article in this series illustrated why a layered security approach to Cybersecurity is important from the standpoints of both a business/enterprise and...
The Concept of Layered Security (Part 2)
Ravi Das kicked off this series by explaining the basics of taking a layered approach to Cybersecurity. In this article, he explains why a...
The Concept of Layered Security (Part 1)
In the traditional model of overall Cybersecurity, only one layer of defense has been used. This is most commonly associated with that of legacy...
Biometrics and the Zero Trust Framework (Part 5)
So far, this series has covered various biometric modalities that can be used with the Zero Trust Framework. This final article pulls it all together by...