TagsCyberSecurity

Tag: CyberSecurity

Top Cybersecurity Incidents of 2023

The trend of Cyberattacks and breaches continued to gain steam in 2023. WeLiveSecurity.com has compiled a report detailing 10 of the biggest security incidents...

Physical & Behavioral Biometric Technologies: Part 11

In the previous article, expert Ravi Das introduced the physiology of the retina and provided background on the development of retinal scanners. Here, he...

Making Secure Electronic Documents Cyber Resilient: Part 1

Imagine being denied entry to a foreign country because the electronic chip in your travel document is considered vulnerable and you would have to...

The Use of Social Media in the Workplace (Part 1)

Gone are the days when a business would have to spend hundreds of thousands of dollars on radio and television ads to showcase their...

The Concept of Layered Security (Part 1)

In the traditional model of overall Cybersecurity, only one layer of defense has been used.  This is most commonly associated with that of legacy...

The Role Of Artificial Intelligence In Cybersecurity (Part 4)

Previous articles in this series provided a definition of Artificial Intelligence (AI) and a general overview of its use in Cybersecurity, described various types...

Style Hunter

- Advertisement -
- Advertisement -

POPULAR POSTS

MY FAVORITES

- Advertisement -

RECOMMENDED VIDEOS

POPULAR

- Advertisement -

APLICATIONS

Identity Threat Assessment and Prediction (ITAP)

Identity theft, fraud and related crimes are increasingly common occurrences. The Center for Identity at The University of Texas (UT CID) is studying these...

HOT NEWS

MOST COMMENTED

Transparent ink

Transparent ink that becomes visible/invisible, depending on the angle of view and/or light.

HD Barcode

HOT NEWS